From sle-updates at lists.suse.com Tue Jul 1 11:04:12 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 1 Jul 2014 19:04:12 +0200 (CEST) Subject: SUSE-RU-2014:0863-1: Recommended update for WALinuxAgent Message-ID: <20140701170412.3607A3214F@maintenance.suse.de> SUSE Recommended Update: Recommended update for WALinuxAgent ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0863-1 Rating: low References: #880949 Affected Products: SUSE Linux Enterprise Server 11 SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: WALinuxAgent has been updated to version 2.0.5, bringing many fixes and enhancements: * Multiple fixes for the extension handler framework. * Replace platform.* calls with DistInfo() function. * EnvMonitor: Set SCSI I/O timeout for all attached disks. * Fix encoding issue in LogToFile() & LogToCon(). * Add support for parsing ExtensionsConfiguration from GoalState document. * Add exception awareness to GetFileContents, SetFileContents, and AppendFileContents. * Fix publishHostname(): Leave dhclient.conf alone if it is already configured to send the system's current hostname to the DHCP server. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-WALinuxAgent-9314 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 (noarch): WALinuxAgent-2.0.5-0.5.1 References: https://bugzilla.novell.com/880949 http://download.suse.com/patch/finder/?keywords=7b2a4b37d0b0bb471393984ceca70628 From sle-updates at lists.suse.com Tue Jul 1 13:04:11 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 1 Jul 2014 21:04:11 +0200 (CEST) Subject: SUSE-RU-2014:0864-1: Recommended update for nmap Message-ID: <20140701190411.DD2673214F@maintenance.suse.de> SUSE Recommended Update: Recommended update for nmap ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0864-1 Rating: low References: #823749 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for nmap fixes the following issue: * Ping check fails on secondary local addresses. (bnc#823749) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-nmap-9356 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-nmap-9356 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): nmap-4.75-1.30.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): nmap-4.75-1.30.1 References: https://bugzilla.novell.com/823749 http://download.suse.com/patch/finder/?keywords=fbcdde04d6c97ed515215c513de767ef From sle-updates at lists.suse.com Thu Jul 3 16:04:16 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 4 Jul 2014 00:04:16 +0200 (CEST) Subject: SUSE-SU-2014:0868-1: important: Security update for PHP5 Message-ID: <20140703220416.D9AA032157@maintenance.suse.de> SUSE Security Update: Security update for PHP5 ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0868-1 Rating: important References: #868624 #882992 Cross-References: CVE-2014-2497 CVE-2014-4049 Affected Products: SUSE Linux Enterprise Server 11 SP2 LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: PHP5 has been updated to fix two security vulnerabilities: * Heap-based buffer overflow in DNS TXT record parsing (CVE-2014-4049) * NULL pointer dereference in GD XPM decoder (CVE-2014-2497) Security Issue references: * CVE-2014-4049 * CVE-2014-2497 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 LTSS: zypper in -t patch slessp2-apache2-mod_php5-9409 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64): apache2-mod_php5-5.2.14-0.7.30.54.1 php5-5.2.14-0.7.30.54.1 php5-bcmath-5.2.14-0.7.30.54.1 php5-bz2-5.2.14-0.7.30.54.1 php5-calendar-5.2.14-0.7.30.54.1 php5-ctype-5.2.14-0.7.30.54.1 php5-curl-5.2.14-0.7.30.54.1 php5-dba-5.2.14-0.7.30.54.1 php5-dbase-5.2.14-0.7.30.54.1 php5-dom-5.2.14-0.7.30.54.1 php5-exif-5.2.14-0.7.30.54.1 php5-fastcgi-5.2.14-0.7.30.54.1 php5-ftp-5.2.14-0.7.30.54.1 php5-gd-5.2.14-0.7.30.54.1 php5-gettext-5.2.14-0.7.30.54.1 php5-gmp-5.2.14-0.7.30.54.1 php5-hash-5.2.14-0.7.30.54.1 php5-iconv-5.2.14-0.7.30.54.1 php5-json-5.2.14-0.7.30.54.1 php5-ldap-5.2.14-0.7.30.54.1 php5-mbstring-5.2.14-0.7.30.54.1 php5-mcrypt-5.2.14-0.7.30.54.1 php5-mysql-5.2.14-0.7.30.54.1 php5-odbc-5.2.14-0.7.30.54.1 php5-openssl-5.2.14-0.7.30.54.1 php5-pcntl-5.2.14-0.7.30.54.1 php5-pdo-5.2.14-0.7.30.54.1 php5-pear-5.2.14-0.7.30.54.1 php5-pgsql-5.2.14-0.7.30.54.1 php5-pspell-5.2.14-0.7.30.54.1 php5-shmop-5.2.14-0.7.30.54.1 php5-snmp-5.2.14-0.7.30.54.1 php5-soap-5.2.14-0.7.30.54.1 php5-suhosin-5.2.14-0.7.30.54.1 php5-sysvmsg-5.2.14-0.7.30.54.1 php5-sysvsem-5.2.14-0.7.30.54.1 php5-sysvshm-5.2.14-0.7.30.54.1 php5-tokenizer-5.2.14-0.7.30.54.1 php5-wddx-5.2.14-0.7.30.54.1 php5-xmlreader-5.2.14-0.7.30.54.1 php5-xmlrpc-5.2.14-0.7.30.54.1 php5-xmlwriter-5.2.14-0.7.30.54.1 php5-xsl-5.2.14-0.7.30.54.1 php5-zip-5.2.14-0.7.30.54.1 php5-zlib-5.2.14-0.7.30.54.1 References: http://support.novell.com/security/cve/CVE-2014-2497.html http://support.novell.com/security/cve/CVE-2014-4049.html https://bugzilla.novell.com/868624 https://bugzilla.novell.com/882992 http://download.suse.com/patch/finder/?keywords=5a6e6d1523035a22186fef4bad38da0d From sle-updates at lists.suse.com Thu Jul 3 17:04:15 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 4 Jul 2014 01:04:15 +0200 (CEST) Subject: SUSE-SU-2014:0869-1: important: Security update for php53 Message-ID: <20140703230415.3F0CA320B5@maintenance.suse.de> SUSE Security Update: Security update for php53 ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0869-1 Rating: important References: #868624 #880904 #880905 #882992 Cross-References: CVE-2014-0237 CVE-2014-0238 CVE-2014-2497 CVE-2014-4049 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Server 11 SP2 LTSS ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: php53 was updated to fix the following security vulnerabilities: * Heap-based buffer overflow in DNS TXT record parsing. (CVE-2014-4049) * Denial of service in Fileinfo component. (CVE-2014-0238) * Performance degradation by too many file_printf calls. (CVE-2014-0237) * NULL pointer dereference in GD XPM decoder. (CVE-2014-2497) Security Issues references: * CVE-2014-4049 * CVE-2014-0238 * CVE-2014-0237 * CVE-2014-2497 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-apache2-mod_php53-9450 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-apache2-mod_php53-9450 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-apache2-mod_php53-9450 - SUSE Linux Enterprise Server 11 SP2 LTSS: zypper in -t patch slessp2-apache2-mod_php53-9412 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): php53-devel-5.3.17-0.23.5 php53-imap-5.3.17-0.23.5 php53-posix-5.3.17-0.23.5 php53-readline-5.3.17-0.23.5 php53-sockets-5.3.17-0.23.5 php53-sqlite-5.3.17-0.23.5 php53-tidy-5.3.17-0.23.5 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): apache2-mod_php53-5.3.17-0.23.5 php53-5.3.17-0.23.5 php53-bcmath-5.3.17-0.23.5 php53-bz2-5.3.17-0.23.5 php53-calendar-5.3.17-0.23.5 php53-ctype-5.3.17-0.23.5 php53-curl-5.3.17-0.23.5 php53-dba-5.3.17-0.23.5 php53-dom-5.3.17-0.23.5 php53-exif-5.3.17-0.23.5 php53-fastcgi-5.3.17-0.23.5 php53-fileinfo-5.3.17-0.23.5 php53-ftp-5.3.17-0.23.5 php53-gd-5.3.17-0.23.5 php53-gettext-5.3.17-0.23.5 php53-gmp-5.3.17-0.23.5 php53-iconv-5.3.17-0.23.5 php53-intl-5.3.17-0.23.5 php53-json-5.3.17-0.23.5 php53-ldap-5.3.17-0.23.5 php53-mbstring-5.3.17-0.23.5 php53-mcrypt-5.3.17-0.23.5 php53-mysql-5.3.17-0.23.5 php53-odbc-5.3.17-0.23.5 php53-openssl-5.3.17-0.23.5 php53-pcntl-5.3.17-0.23.5 php53-pdo-5.3.17-0.23.5 php53-pear-5.3.17-0.23.5 php53-pgsql-5.3.17-0.23.5 php53-pspell-5.3.17-0.23.5 php53-shmop-5.3.17-0.23.5 php53-snmp-5.3.17-0.23.5 php53-soap-5.3.17-0.23.5 php53-suhosin-5.3.17-0.23.5 php53-sysvmsg-5.3.17-0.23.5 php53-sysvsem-5.3.17-0.23.5 php53-sysvshm-5.3.17-0.23.5 php53-tokenizer-5.3.17-0.23.5 php53-wddx-5.3.17-0.23.5 php53-xmlreader-5.3.17-0.23.5 php53-xmlrpc-5.3.17-0.23.5 php53-xmlwriter-5.3.17-0.23.5 php53-xsl-5.3.17-0.23.5 php53-zip-5.3.17-0.23.5 php53-zlib-5.3.17-0.23.5 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): apache2-mod_php53-5.3.17-0.23.5 php53-5.3.17-0.23.5 php53-bcmath-5.3.17-0.23.5 php53-bz2-5.3.17-0.23.5 php53-calendar-5.3.17-0.23.5 php53-ctype-5.3.17-0.23.5 php53-curl-5.3.17-0.23.5 php53-dba-5.3.17-0.23.5 php53-dom-5.3.17-0.23.5 php53-exif-5.3.17-0.23.5 php53-fastcgi-5.3.17-0.23.5 php53-fileinfo-5.3.17-0.23.5 php53-ftp-5.3.17-0.23.5 php53-gd-5.3.17-0.23.5 php53-gettext-5.3.17-0.23.5 php53-gmp-5.3.17-0.23.5 php53-iconv-5.3.17-0.23.5 php53-intl-5.3.17-0.23.5 php53-json-5.3.17-0.23.5 php53-ldap-5.3.17-0.23.5 php53-mbstring-5.3.17-0.23.5 php53-mcrypt-5.3.17-0.23.5 php53-mysql-5.3.17-0.23.5 php53-odbc-5.3.17-0.23.5 php53-openssl-5.3.17-0.23.5 php53-pcntl-5.3.17-0.23.5 php53-pdo-5.3.17-0.23.5 php53-pear-5.3.17-0.23.5 php53-pgsql-5.3.17-0.23.5 php53-pspell-5.3.17-0.23.5 php53-shmop-5.3.17-0.23.5 php53-snmp-5.3.17-0.23.5 php53-soap-5.3.17-0.23.5 php53-suhosin-5.3.17-0.23.5 php53-sysvmsg-5.3.17-0.23.5 php53-sysvsem-5.3.17-0.23.5 php53-sysvshm-5.3.17-0.23.5 php53-tokenizer-5.3.17-0.23.5 php53-wddx-5.3.17-0.23.5 php53-xmlreader-5.3.17-0.23.5 php53-xmlrpc-5.3.17-0.23.5 php53-xmlwriter-5.3.17-0.23.5 php53-xsl-5.3.17-0.23.5 php53-zip-5.3.17-0.23.5 php53-zlib-5.3.17-0.23.5 - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64): apache2-mod_php53-5.3.8-0.45.1 php53-5.3.8-0.45.1 php53-bcmath-5.3.8-0.45.1 php53-bz2-5.3.8-0.45.1 php53-calendar-5.3.8-0.45.1 php53-ctype-5.3.8-0.45.1 php53-curl-5.3.8-0.45.1 php53-dba-5.3.8-0.45.1 php53-dom-5.3.8-0.45.1 php53-exif-5.3.8-0.45.1 php53-fastcgi-5.3.8-0.45.1 php53-fileinfo-5.3.8-0.45.1 php53-ftp-5.3.8-0.45.1 php53-gd-5.3.8-0.45.1 php53-gettext-5.3.8-0.45.1 php53-gmp-5.3.8-0.45.1 php53-iconv-5.3.8-0.45.1 php53-intl-5.3.8-0.45.1 php53-json-5.3.8-0.45.1 php53-ldap-5.3.8-0.45.1 php53-mbstring-5.3.8-0.45.1 php53-mcrypt-5.3.8-0.45.1 php53-mysql-5.3.8-0.45.1 php53-odbc-5.3.8-0.45.1 php53-openssl-5.3.8-0.45.1 php53-pcntl-5.3.8-0.45.1 php53-pdo-5.3.8-0.45.1 php53-pear-5.3.8-0.45.1 php53-pgsql-5.3.8-0.45.1 php53-pspell-5.3.8-0.45.1 php53-shmop-5.3.8-0.45.1 php53-snmp-5.3.8-0.45.1 php53-soap-5.3.8-0.45.1 php53-suhosin-5.3.8-0.45.1 php53-sysvmsg-5.3.8-0.45.1 php53-sysvsem-5.3.8-0.45.1 php53-sysvshm-5.3.8-0.45.1 php53-tokenizer-5.3.8-0.45.1 php53-wddx-5.3.8-0.45.1 php53-xmlreader-5.3.8-0.45.1 php53-xmlrpc-5.3.8-0.45.1 php53-xmlwriter-5.3.8-0.45.1 php53-xsl-5.3.8-0.45.1 php53-zip-5.3.8-0.45.1 php53-zlib-5.3.8-0.45.1 References: http://support.novell.com/security/cve/CVE-2014-0237.html http://support.novell.com/security/cve/CVE-2014-0238.html http://support.novell.com/security/cve/CVE-2014-2497.html http://support.novell.com/security/cve/CVE-2014-4049.html https://bugzilla.novell.com/868624 https://bugzilla.novell.com/880904 https://bugzilla.novell.com/880905 https://bugzilla.novell.com/882992 http://download.suse.com/patch/finder/?keywords=24af4f1fb61302a96ae3f3848e959f3e http://download.suse.com/patch/finder/?keywords=5fd4babb2b94366a99361b1841655c7b From sle-updates at lists.suse.com Fri Jul 4 13:04:12 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 4 Jul 2014 21:04:12 +0200 (CEST) Subject: SUSE-SU-2014:0870-1: important: Security update for xalan-j2 Message-ID: <20140704190412.2E22932158@maintenance.suse.de> SUSE Security Update: Security update for xalan-j2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0870-1 Rating: important References: #870082 Cross-References: CVE-2014-0107 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: xalan-j2 has been updated to ensure that secure processing can't be circumvented (CVE-2014-0107). Security Issues: * CVE-2014-0107 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-xalan-j2-9426 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-xalan-j2-9426 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-xalan-j2-9426 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-xalan-j2-9426 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (noarch): xalan-j2-demo-2.7.0-217.26.1 xalan-j2-javadoc-2.7.0-217.26.1 xalan-j2-manual-2.7.0-217.26.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (noarch): xalan-j2-2.7.0-217.26.1 - SUSE Linux Enterprise Server 11 SP3 (noarch): xalan-j2-2.7.0-217.26.1 - SUSE Linux Enterprise Desktop 11 SP3 (noarch): xalan-j2-2.7.0-217.26.1 References: http://support.novell.com/security/cve/CVE-2014-0107.html https://bugzilla.novell.com/870082 http://download.suse.com/patch/finder/?keywords=0b708cd10b2be38eb32277ed72aa1a90 From sle-updates at lists.suse.com Fri Jul 4 18:04:15 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 5 Jul 2014 02:04:15 +0200 (CEST) Subject: SUSE-SU-2014:0871-1: moderate: Security update for xinetd Message-ID: <20140705000415.36453320B5@maintenance.suse.de> SUSE Security Update: Security update for xinetd ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0871-1 Rating: moderate References: #762294 #844230 Cross-References: CVE-2012-0862 CVE-2013-4342 Affected Products: SUSE Linux Enterprise Server 11 SP2 LTSS SUSE Linux Enterprise Server 11 SP1 LTSS SUSE Linux Enterprise Server 10 SP4 LTSS SUSE Linux Enterprise Server 10 SP3 LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: Xinetd receives a LTSS roll-up update to fix two security issues. * CVE-2012-0862: xinetd enabled all services when tcp multiplexing is used. * CVE-2013-4342: xinetd ignored user and group directives for tcpmux services, running services as root. While both issues are not so problematic on their own, in combination the impact is greater and enabling tcpmux would be risky. Security Issues: * CVE-2013-4342 * CVE-2012-0862 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 LTSS: zypper in -t patch slessp2-xinetd-9417 - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-xinetd-9418 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64): xinetd-2.3.14-130.133.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): xinetd-2.3.14-130.133.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64): xinetd-2.3.14-14.12.1 - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64): xinetd-2.3.14-14.12.1 References: http://support.novell.com/security/cve/CVE-2012-0862.html http://support.novell.com/security/cve/CVE-2013-4342.html https://bugzilla.novell.com/762294 https://bugzilla.novell.com/844230 http://download.suse.com/patch/finder/?keywords=02d02e7774b10b86c728bb88af735b33 http://download.suse.com/patch/finder/?keywords=5d400fd9a30cb44112b8a54c0743cc7b http://download.suse.com/patch/finder/?keywords=697d9a5cda282587ef2ff61975bbcad4 http://download.suse.com/patch/finder/?keywords=c6f4a3dc598f45466f0a0699473c1f57 From sle-updates at lists.suse.com Fri Jul 4 18:04:45 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 5 Jul 2014 02:04:45 +0200 (CEST) Subject: SUSE-SU-2014:0872-1: Security update for sendmail Message-ID: <20140705000445.B4D3232158@maintenance.suse.de> SUSE Security Update: Security update for sendmail ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0872-1 Rating: low References: #881284 Cross-References: CVE-2014-3956 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: sendmail has been updated to fix the following security issue: * Not properly closing file descriptors before executing programs (CVE-2014-3956). Security Issues: * CVE-2014-3956 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-rmail-9345 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-rmail-9345 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-rmail-9345 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): sendmail-devel-8.14.3-50.24.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64): sendmail-8.14.3-50.24.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): sendmail-8.14.3-50.24.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): sendmail-8.14.3-50.24.1 References: http://support.novell.com/security/cve/CVE-2014-3956.html https://bugzilla.novell.com/881284 http://download.suse.com/patch/finder/?keywords=4bfe755a8627746ff3e865aad2a79a0a From sle-updates at lists.suse.com Fri Jul 4 18:05:02 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 5 Jul 2014 02:05:02 +0200 (CEST) Subject: SUSE-SU-2014:0873-1: important: Security update for PHP5 Message-ID: <20140705000502.9189732158@maintenance.suse.de> SUSE Security Update: Security update for PHP5 ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0873-1 Rating: important References: #837746 #854880 #868624 #882992 Cross-References: CVE-2013-4248 CVE-2013-6420 CVE-2014-2497 CVE-2014-4049 Affected Products: SUSE Linux Enterprise Server 10 SP4 LTSS SUSE Linux Enterprise Server 10 SP3 LTSS ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. It includes one version update. Description: PHP5 has been updated to fix four security vulnerabilities: * Heap-based buffer overflow in DNS TXT record parsing (CVE-2014-4049) * NULL pointer dereference in GD XPM decoder (CVE-2014-2497) * Memory corrpution in openssl_parse_x509 (CVE-2013-6420) * Attackers can perform man-in-the-middle attacks by specially crafting certificates (CVE-2013-4248) Security Issues: * CVE-2014-4049 * CVE-2014-2497 * CVE-2013-6420 * CVE-2013-4248 Package List: - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64): apache2-mod_php5-5.2.14-0.48.1 php5-5.2.14-0.48.1 php5-bcmath-5.2.14-0.48.1 php5-bz2-5.2.14-0.48.1 php5-calendar-5.2.14-0.48.1 php5-ctype-5.2.14-0.48.1 php5-curl-5.2.14-0.48.1 php5-dba-5.2.14-0.48.1 php5-dbase-5.2.14-0.48.1 php5-devel-5.2.14-0.48.1 php5-dom-5.2.14-0.48.1 php5-exif-5.2.14-0.48.1 php5-fastcgi-5.2.14-0.48.1 php5-ftp-5.2.14-0.48.1 php5-gd-5.2.14-0.48.1 php5-gettext-5.2.14-0.48.1 php5-gmp-5.2.14-0.48.1 php5-hash-5.2.14-0.48.1 php5-iconv-5.2.14-0.48.1 php5-imap-5.2.14-0.48.1 php5-json-5.2.14-0.48.1 php5-ldap-5.2.14-0.48.1 php5-mbstring-5.2.14-0.48.1 php5-mcrypt-5.2.14-0.48.1 php5-mhash-5.2.14-0.48.1 php5-mysql-5.2.14-0.48.1 php5-ncurses-5.2.14-0.48.1 php5-odbc-5.2.14-0.48.1 php5-openssl-5.2.14-0.48.1 php5-pcntl-5.2.14-0.48.1 php5-pdo-5.2.14-0.48.1 php5-pear-5.2.14-0.48.1 php5-pgsql-5.2.14-0.48.1 php5-posix-5.2.14-0.48.1 php5-pspell-5.2.14-0.48.1 php5-shmop-5.2.14-0.48.1 php5-snmp-5.2.14-0.48.1 php5-soap-5.2.14-0.48.1 php5-sockets-5.2.14-0.48.1 php5-sqlite-5.2.14-0.48.1 php5-suhosin-5.2.14-0.48.1 php5-sysvmsg-5.2.14-0.48.1 php5-sysvsem-5.2.14-0.48.1 php5-sysvshm-5.2.14-0.48.1 php5-tokenizer-5.2.14-0.48.1 php5-wddx-5.2.14-0.48.1 php5-xmlreader-5.2.14-0.48.1 php5-xmlrpc-5.2.14-0.48.1 php5-xsl-5.2.14-0.48.1 php5-zlib-5.2.14-0.48.1 - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64) [New Version: 5.2.14]: apache2-mod_php5-5.2.14-0.48.1 php5-5.2.14-0.48.1 php5-bcmath-5.2.14-0.48.1 php5-bz2-5.2.14-0.48.1 php5-calendar-5.2.14-0.48.1 php5-ctype-5.2.14-0.48.1 php5-curl-5.2.14-0.48.1 php5-dba-5.2.14-0.48.1 php5-dbase-5.2.14-0.48.1 php5-devel-5.2.14-0.48.1 php5-dom-5.2.14-0.48.1 php5-exif-5.2.14-0.48.1 php5-fastcgi-5.2.14-0.48.1 php5-ftp-5.2.14-0.48.1 php5-gd-5.2.14-0.48.1 php5-gettext-5.2.14-0.48.1 php5-gmp-5.2.14-0.48.1 php5-hash-5.2.14-0.48.1 php5-iconv-5.2.14-0.48.1 php5-imap-5.2.14-0.48.1 php5-json-5.2.14-0.48.1 php5-ldap-5.2.14-0.48.1 php5-mbstring-5.2.14-0.48.1 php5-mcrypt-5.2.14-0.48.1 php5-mhash-5.2.14-0.48.1 php5-mysql-5.2.14-0.48.1 php5-ncurses-5.2.14-0.48.1 php5-odbc-5.2.14-0.48.1 php5-openssl-5.2.14-0.48.1 php5-pcntl-5.2.14-0.48.1 php5-pdo-5.2.14-0.48.1 php5-pear-5.2.14-0.48.1 php5-pgsql-5.2.14-0.48.1 php5-posix-5.2.14-0.48.1 php5-pspell-5.2.14-0.48.1 php5-shmop-5.2.14-0.48.1 php5-snmp-5.2.14-0.48.1 php5-soap-5.2.14-0.48.1 php5-sockets-5.2.14-0.48.1 php5-sqlite-5.2.14-0.48.1 php5-suhosin-5.2.14-0.48.1 php5-sysvmsg-5.2.14-0.48.1 php5-sysvsem-5.2.14-0.48.1 php5-sysvshm-5.2.14-0.48.1 php5-tokenizer-5.2.14-0.48.1 php5-wddx-5.2.14-0.48.1 php5-xmlreader-5.2.14-0.48.1 php5-xmlrpc-5.2.14-0.48.1 php5-xsl-5.2.14-0.48.1 php5-zlib-5.2.14-0.48.1 References: http://support.novell.com/security/cve/CVE-2013-4248.html http://support.novell.com/security/cve/CVE-2013-6420.html http://support.novell.com/security/cve/CVE-2014-2497.html http://support.novell.com/security/cve/CVE-2014-4049.html https://bugzilla.novell.com/837746 https://bugzilla.novell.com/854880 https://bugzilla.novell.com/868624 https://bugzilla.novell.com/882992 http://download.suse.com/patch/finder/?keywords=3eaed290beadcf7a262e364bfa245f7a http://download.suse.com/patch/finder/?keywords=c644113f641b16b9a35807029c904216 From sle-updates at lists.suse.com Mon Jul 7 11:04:16 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 7 Jul 2014 19:04:16 +0200 (CEST) Subject: SUSE-RU-2014:0875-1: Recommended update for crowbar-barclamp-nova Message-ID: <20140707170416.8901732159@maintenance.suse.de> SUSE Recommended Update: Recommended update for crowbar-barclamp-nova ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0875-1 Rating: low References: #869955 Affected Products: SUSE Cloud 3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes two new package versions. Description: This update for Cloud3 provides the following fixes for crowbar-barclamp-nova: * Update to version 1.7+git.1401120372.c264b2b: o Expose neutron_url_timeout (bnc#869955) Contraindications: Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 3: zypper in -t patch sleclo30sp3-crowbar-barclamp-nova-9461 sleclo30sp3-python-neutronclient-9474 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 3 (x86_64) [New Version: 2.3.4]: python-neutronclient-2.3.4-0.11.1 - SUSE Cloud 3 (noarch): crowbar-barclamp-nova-1.7+git.1401120372.c264b2b-0.7.2 References: https://bugzilla.novell.com/869955 http://download.suse.com/patch/finder/?keywords=802e91c8498e3e2c1a1436f61ac28172 http://download.suse.com/patch/finder/?keywords=bf02d79c6f22e1dd0103601ce002c0fd From sle-updates at lists.suse.com Mon Jul 7 11:04:40 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 7 Jul 2014 19:04:40 +0200 (CEST) Subject: SUSE-SU-2014:0873-2: important: Security update for PHP5 Message-ID: <20140707170440.097683215B@maintenance.suse.de> SUSE Security Update: Security update for PHP5 ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0873-2 Rating: important References: #837746 #854880 #868624 #882992 Cross-References: CVE-2013-4248 CVE-2013-6420 CVE-2014-2497 CVE-2014-4049 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. It includes one version update. Description: PHP5 has been updated to fix four security vulnerabilities: * Heap-based buffer overflow in DNS TXT record parsing (CVE-2014-4049) * Heap based buffer overflow in time handling in openssl_x509_parse (CVE-2013-6420) * Man in the Middle attack in the the openssl_x509_parse due to lack of \0 handling (CVE-2013-4248) * NULL pointer dereference in GD XPM decoder (CVE-2014-2497) Security Issues: * CVE-2014-4049 * CVE-2013-6420 * CVE-2013-4248 * CVE-2014-2497 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-apache2-mod_php5-9420 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 5.2.14]: apache2-mod_php5-5.2.14-0.7.30.54.1 php5-5.2.14-0.7.30.54.1 php5-bcmath-5.2.14-0.7.30.54.1 php5-bz2-5.2.14-0.7.30.54.1 php5-calendar-5.2.14-0.7.30.54.1 php5-ctype-5.2.14-0.7.30.54.1 php5-curl-5.2.14-0.7.30.54.1 php5-dba-5.2.14-0.7.30.54.1 php5-dbase-5.2.14-0.7.30.54.1 php5-dom-5.2.14-0.7.30.54.1 php5-exif-5.2.14-0.7.30.54.1 php5-fastcgi-5.2.14-0.7.30.54.1 php5-ftp-5.2.14-0.7.30.54.1 php5-gd-5.2.14-0.7.30.54.1 php5-gettext-5.2.14-0.7.30.54.1 php5-gmp-5.2.14-0.7.30.54.1 php5-hash-5.2.14-0.7.30.54.1 php5-iconv-5.2.14-0.7.30.54.1 php5-json-5.2.14-0.7.30.54.1 php5-ldap-5.2.14-0.7.30.54.1 php5-mbstring-5.2.14-0.7.30.54.1 php5-mcrypt-5.2.14-0.7.30.54.1 php5-mysql-5.2.14-0.7.30.54.1 php5-odbc-5.2.14-0.7.30.54.1 php5-openssl-5.2.14-0.7.30.54.1 php5-pcntl-5.2.14-0.7.30.54.1 php5-pdo-5.2.14-0.7.30.54.1 php5-pear-5.2.14-0.7.30.54.1 php5-pgsql-5.2.14-0.7.30.54.1 php5-pspell-5.2.14-0.7.30.54.1 php5-shmop-5.2.14-0.7.30.54.1 php5-snmp-5.2.14-0.7.30.54.1 php5-soap-5.2.14-0.7.30.54.1 php5-suhosin-5.2.14-0.7.30.54.1 php5-sysvmsg-5.2.14-0.7.30.54.1 php5-sysvsem-5.2.14-0.7.30.54.1 php5-sysvshm-5.2.14-0.7.30.54.1 php5-tokenizer-5.2.14-0.7.30.54.1 php5-wddx-5.2.14-0.7.30.54.1 php5-xmlreader-5.2.14-0.7.30.54.1 php5-xmlrpc-5.2.14-0.7.30.54.1 php5-xmlwriter-5.2.14-0.7.30.54.1 php5-xsl-5.2.14-0.7.30.54.1 php5-zip-5.2.14-0.7.30.54.1 php5-zlib-5.2.14-0.7.30.54.1 References: http://support.novell.com/security/cve/CVE-2013-4248.html http://support.novell.com/security/cve/CVE-2013-6420.html http://support.novell.com/security/cve/CVE-2014-2497.html http://support.novell.com/security/cve/CVE-2014-4049.html https://bugzilla.novell.com/837746 https://bugzilla.novell.com/854880 https://bugzilla.novell.com/868624 https://bugzilla.novell.com/882992 http://download.suse.com/patch/finder/?keywords=ef5152d8c6b82d5be1a08ded9c1e0a7a From sle-updates at lists.suse.com Mon Jul 7 12:04:12 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 7 Jul 2014 20:04:12 +0200 (CEST) Subject: SUSE-RU-2014:0876-1: Recommended update for python-cinderclient Message-ID: <20140707180412.0345032159@maintenance.suse.de> SUSE Recommended Update: Recommended update for python-cinderclient ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0876-1 Rating: low References: #871764 Affected Products: SUSE Cloud 3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for Cloud3 provides the following fixes for python-cinderclient: * Add search_opts into the method list for VolumeTypeM (bnc#871764) * Use upstream URL as source (enables verification) Contraindications: Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 3: zypper in -t patch sleclo30sp3-python-cinderclient-9473 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 3 (x86_64): python-cinderclient-1.0.7-0.11.1 python-cinderclient-doc-1.0.7-0.11.1 References: https://bugzilla.novell.com/871764 http://download.suse.com/patch/finder/?keywords=85c4bdca52111432986e028487c8a82c From sle-updates at lists.suse.com Mon Jul 7 13:04:12 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 7 Jul 2014 21:04:12 +0200 (CEST) Subject: SUSE-RU-2014:0877-1: Recommended update for dhcp Message-ID: <20140707190412.36AD732159@maintenance.suse.de> SUSE Recommended Update: Recommended update for dhcp ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0877-1 Rating: low References: #835818 #842360 #868250 #868253 #878846 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that has 5 recommended fixes can now be installed. Description: This update for dhcp provides the following fixes: * Fixed dhcp server start script to use correct libdir. (bnc#868250) * Fixed dhcp server to chown leases to run user at start. (bnc#868253) * Fixed to write missed dhcp-ldap debug level messages. (bnc#835818) * Added /etc/bindresvport.blacklist to dhcp server chroot file lists. (bnc#842360) * Fix subclass statement handling in contrib/ldap/dhcpd-conf-to-ldap. (bnc#878846) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-dhcp-9465 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-dhcp-9465 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-dhcp-9465 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-dhcp-9465 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): dhcp-devel-4.2.4.P2-0.20.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): dhcp-4.2.4.P2-0.20.1 dhcp-client-4.2.4.P2-0.20.1 dhcp-relay-4.2.4.P2-0.20.1 dhcp-server-4.2.4.P2-0.20.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): dhcp-4.2.4.P2-0.20.1 dhcp-client-4.2.4.P2-0.20.1 dhcp-relay-4.2.4.P2-0.20.1 dhcp-server-4.2.4.P2-0.20.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): dhcp-4.2.4.P2-0.20.1 dhcp-client-4.2.4.P2-0.20.1 References: https://bugzilla.novell.com/835818 https://bugzilla.novell.com/842360 https://bugzilla.novell.com/868250 https://bugzilla.novell.com/868253 https://bugzilla.novell.com/878846 http://download.suse.com/patch/finder/?keywords=dada58a9e67f84422f26991ca11c370d From sle-updates at lists.suse.com Tue Jul 8 18:04:19 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 9 Jul 2014 02:04:19 +0200 (CEST) Subject: SUSE-SU-2014:0879-1: moderate: Security update for quagga Message-ID: <20140709000419.9038532148@maintenance.suse.de> SUSE Security Update: Security update for quagga ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0879-1 Rating: moderate References: #822572 #828117 Cross-References: CVE-2013-0149 CVE-2013-2236 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS SUSE Linux Enterprise Server 10 SP4 LTSS SUSE Linux Enterprise Server 10 SP3 LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: Quagga received an update fixing two security issues: * CVE-2013-2236: Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga, when --enable-opaque-lsa and the -a command line option are used, allowed remote attackers to cause a denial of service (crash) via a large LSA. * CVE-2013-0149: The OSPF implementation in Quagga did not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet. Security Issues references: * CVE-2013-2236 * CVE-2013-0149 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-quagga-9416 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): quagga-0.99.15-0.14.11 - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64): quagga-0.99.9-14.17.12 quagga-devel-0.99.9-14.17.12 - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64): quagga-0.99.9-14.17.12 quagga-devel-0.99.9-14.17.12 References: http://support.novell.com/security/cve/CVE-2013-0149.html http://support.novell.com/security/cve/CVE-2013-2236.html https://bugzilla.novell.com/822572 https://bugzilla.novell.com/828117 http://download.suse.com/patch/finder/?keywords=6cc544cafa35bad90a6c69b6b80644c6 http://download.suse.com/patch/finder/?keywords=718958de9702ca0d22de230f19958498 http://download.suse.com/patch/finder/?keywords=c9f78ccd5294160085407a80780f26a7 From sle-updates at lists.suse.com Tue Jul 8 19:04:41 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 9 Jul 2014 03:04:41 +0200 (CEST) Subject: SUSE-SU-2014:0880-1: moderate: Security update for puppet Message-ID: <20140709010441.DDFDC32159@maintenance.suse.de> SUSE Security Update: Security update for puppet ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0880-1 Rating: moderate References: #856843 #879913 Cross-References: CVE-2013-4969 CVE-2014-3248 CVE-2014-3250 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: Puppet was updated to fix the following security issues: * Unsafe use of temporary files. (CVE-2013-4969) * Arbitrary code execution with required social engineering. (CVE-2014-3248, CVE-2014-3250) Security Issues references: * CVE-2014-3248 * CVE-2013-4969 * CVE-2014-3250 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-puppet-9472 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-puppet-9472 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-puppet-9472 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): puppet-2.6.18-0.16.1 puppet-server-2.6.18-0.16.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): puppet-2.6.18-0.16.1 puppet-server-2.6.18-0.16.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): puppet-2.6.18-0.16.1 References: http://support.novell.com/security/cve/CVE-2013-4969.html http://support.novell.com/security/cve/CVE-2014-3248.html http://support.novell.com/security/cve/CVE-2014-3250.html https://bugzilla.novell.com/856843 https://bugzilla.novell.com/879913 http://download.suse.com/patch/finder/?keywords=d17fffd3f6cf387cdaeeee0b8585592c From sle-updates at lists.suse.com Wed Jul 9 12:04:13 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 9 Jul 2014 20:04:13 +0200 (CEST) Subject: SUSE-SU-2014:0881-1: moderate: Security update for xorg-x11-libs Message-ID: <20140709180413.707A23215B@maintenance.suse.de> SUSE Security Update: Security update for xorg-x11-libs ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0881-1 Rating: moderate References: #815451 #821663 #854915 #857544 Cross-References: CVE-2013-1984 CVE-2013-1985 CVE-2013-1986 CVE-2013-1988 CVE-2013-1990 CVE-2013-1991 CVE-2013-1992 CVE-2013-1995 CVE-2013-1996 CVE-2013-1998 CVE-2013-1999 CVE-2013-2000 CVE-2013-2001 CVE-2013-2003 CVE-2013-2063 CVE-2013-6462 CVE-2014-0209 CVE-2014-0210 CVE-2014-0211 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that fixes 19 vulnerabilities is now available. Description: This is a SUSE Linux Enterprise Server 11 SP1 LTSS roll up update of xorg-x11-libs, fixing security issues and some bugs. These issues require connection to a malicious X server to trigger the bugs in client libraries. Security issues fixed: * CVE-2013-1984: Multiple integer overflows in X.org libXi allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions. * CVE-2013-1985: Integer overflow in X.org libXinerama allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XineramaQueryScreens function. * CVE-2013-1986: Multiple integer overflows in X.org libXrandr allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRRQueryOutputProperty and (2) XRRQueryProviderProperty functions. * CVE-2013-1988: Multiple integer overflows in X.org libXRes allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XResQueryClients and (2) XResQueryClientResources functions. * CVE-2013-1990: Multiple integer overflows in X.org libXvMC allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvMCListSurfaceTypes and (2) XvMCListSubpictureTypes functions. * CVE-2013-1991: Multiple integer overflows in X.org libXxf86dga allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XDGAQueryModes and (2) XDGASetMode functions. * CVE-2013-1992: Multiple integer overflows in X.org libdmx allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions. * CVE-2013-1995: X.org libXi allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the XListInputDevices function. * CVE-2013-1996: X.org libFS allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the FSOpenServer function. * CVE-2013-1998: Multiple buffer overflows in X.org libXi allowed X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XGetDeviceButtonMapping, (2) XIPassiveGrabDevice, and (3) XQueryDeviceState functions. * CVE-2013-1999: Buffer overflow in X.org libXvMC allowed X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function. * CVE-2013-2000: Multiple buffer overflows in X.org libXxf86dga allowed X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XDGAQueryModes and (2) XDGASetMode functions. * CVE-2013-2001: Buffer overflow in X.org libXxf86vm allowed X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XF86VidModeGetGammaRamp function. * CVE-2013-2003: Integer overflow in X.org libXcursor allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the _XcursorFileHeaderCreate function. * CVE-2013-2063: Integer overflow in X.org libXtst allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XRecordGetContext function. * CVE-2013-6462: Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file. * CVE-2014-0209: Multiple integer overflows in the (1) FontFileAddEntry and (2) lexAlias functions in X.Org libXfont might have allowed local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata. * CVE-2014-0210: Multiple buffer overflows in X.Org libXfont allowed remote font servers to execute arbitrary code via a crafted xfs protocol reply to the (1) _fs_recv_conn_setup, (2) fs_read_open_font, (3) fs_read_query_info, (4) fs_read_extent_info, (5) fs_read_glyphs, (6) fs_read_list, or (7) fs_read_list_info function. * CVE-2014-0211: Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont allowed remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow. Additionally, one non-security issue has been fixed: * XListDev: String size is unsigned char: Make char pointer to the device name & device name len unsigned otherwise we will segfault on device names > 128 characters. Security Issues references: * CVE-2013-1984 * CVE-2013-1985 * CVE-2013-1986 * CVE-2013-1988 * CVE-2013-1990 * CVE-2013-1991 * CVE-2013-1992 * CVE-2013-1995 * CVE-2013-1996 * CVE-2013-1998 * CVE-2013-1999 * CVE-2013-2000 * CVE-2013-2001 * CVE-2013-2003 * CVE-2013-2063 * CVE-2013-6462 * CVE-2014-0209 * CVE-2014-0210 * CVE-2014-0211 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-xorg-x11-devel-9391 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): xorg-x11-libs-7.4-8.26.42.4 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64): xorg-x11-libs-32bit-7.4-8.26.42.4 References: http://support.novell.com/security/cve/CVE-2013-1984.html http://support.novell.com/security/cve/CVE-2013-1985.html http://support.novell.com/security/cve/CVE-2013-1986.html http://support.novell.com/security/cve/CVE-2013-1988.html http://support.novell.com/security/cve/CVE-2013-1990.html http://support.novell.com/security/cve/CVE-2013-1991.html http://support.novell.com/security/cve/CVE-2013-1992.html http://support.novell.com/security/cve/CVE-2013-1995.html http://support.novell.com/security/cve/CVE-2013-1996.html http://support.novell.com/security/cve/CVE-2013-1998.html http://support.novell.com/security/cve/CVE-2013-1999.html http://support.novell.com/security/cve/CVE-2013-2000.html http://support.novell.com/security/cve/CVE-2013-2001.html http://support.novell.com/security/cve/CVE-2013-2003.html http://support.novell.com/security/cve/CVE-2013-2063.html http://support.novell.com/security/cve/CVE-2013-6462.html http://support.novell.com/security/cve/CVE-2014-0209.html http://support.novell.com/security/cve/CVE-2014-0210.html http://support.novell.com/security/cve/CVE-2014-0211.html https://bugzilla.novell.com/815451 https://bugzilla.novell.com/821663 https://bugzilla.novell.com/854915 https://bugzilla.novell.com/857544 http://download.suse.com/patch/finder/?keywords=f7b66bb8d10aeae2b91fccd0d169c8f3 From sle-updates at lists.suse.com Wed Jul 9 12:05:19 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 9 Jul 2014 20:05:19 +0200 (CEST) Subject: SUSE-SU-2014:0882-1: moderate: Security update for xorg-x11-libXv Message-ID: <20140709180519.5755D3215B@maintenance.suse.de> SUSE Security Update: Security update for xorg-x11-libXv ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0882-1 Rating: moderate References: #815451 #821671 Cross-References: CVE-2013-1989 CVE-2013-2066 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This is a SUSE Linux Enterprise Server 11 SP1 LTSS roll up update of xorg-x11-libXv, fixing security issues and some bugs. These issues require connection to a malicious X server to trigger the bugs in client libraries. Security issues fixed: * CVE-2013-1989: Multiple integer overflows in X.org libXv allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function. * CVE-2013-2066: Buffer overflow in X.org libXv allowed X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function. Security Issues references: * CVE-2013-1989 * CVE-2013-2066 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-xorg-x11-libXv-9389 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): xorg-x11-libXv-7.4-1.16.8 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64): xorg-x11-libXv-32bit-7.4-1.16.8 References: http://support.novell.com/security/cve/CVE-2013-1989.html http://support.novell.com/security/cve/CVE-2013-2066.html https://bugzilla.novell.com/815451 https://bugzilla.novell.com/821671 http://download.suse.com/patch/finder/?keywords=501d7c5d73f60606c43e24edd27df5f0 From sle-updates at lists.suse.com Wed Jul 9 16:04:13 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 10 Jul 2014 00:04:13 +0200 (CEST) Subject: SUSE-SU-2014:0883-1: moderate: Security update for xorg-x11-libXext Message-ID: <20140709220413.AB92732158@maintenance.suse.de> SUSE Security Update: Security update for xorg-x11-libXext ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0883-1 Rating: moderate References: #815451 #821665 Cross-References: CVE-2013-1982 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This is a SUSE Linux Enterprise Server 11 SP1 LTSS roll up update of xorg-x11-libXext, fixing a security issue. These issues require connection to a malicious X server to trigger the bugs in client libraries. Security issue fixed: * CVE-2013-1982: Multiple integer overflows in X.org libXext allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XcupGetReservedColormapEntries, (2) XcupStoreColors, (3) XdbeGetVisualInfo, (4) XeviGetVisualInfo, (5) XShapeGetRectangles, and (6) XSyncListSystemCounters functions. Security Issue references: * CVE-2013-1982 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-xorg-x11-libXext-9385 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): xorg-x11-libXext-7.4-1.18.16 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64): xorg-x11-libXext-32bit-7.4-1.18.16 References: http://support.novell.com/security/cve/CVE-2013-1982.html https://bugzilla.novell.com/815451 https://bugzilla.novell.com/821665 http://download.suse.com/patch/finder/?keywords=d7876a977cfa0f3bc65f2617be7e9844 From sle-updates at lists.suse.com Thu Jul 10 17:04:16 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 11 Jul 2014 01:04:16 +0200 (CEST) Subject: SUSE-SU-2014:0885-1: Security update for kdebase4-workspace Message-ID: <20140710230416.2ABC43215B@maintenance.suse.de> SUSE Security Update: Security update for kdebase4-workspace ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0885-1 Rating: low References: #829857 Cross-References: CVE-2013-4132 CVE-2013-4133 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This kdebase4-workspace update fixes two security issues: * NULL pointer dereference in KDM and KCheckPass. (CVE-2013-4132) * Memory leak that could lead to a denial of service. (CVE-2013-4133) Security Issues references: * CVE-2013-4132 * CVE-2013-4133 Indications: Everybody should update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-kde4-kdm-9467 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-kde4-kdm-9467 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-kde4-kdm-9467 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-kde4-kdm-9467 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): kdebase4-workspace-devel-4.3.5-0.12.18.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): kde4-kgreeter-plugins-4.3.5-0.12.18.1 kdebase4-workspace-4.3.5-0.12.18.1 kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 kdm-4.3.5-0.12.18.1 kwin-4.3.5-0.12.18.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (noarch): kdebase4-wallpapers-4.3.5-0.11.18.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): kde4-kgreeter-plugins-4.3.5-0.12.18.1 kdebase4-workspace-4.3.5-0.12.18.1 kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 kdm-4.3.5-0.12.18.1 kwin-4.3.5-0.12.18.1 - SUSE Linux Enterprise Server 11 SP3 (noarch): kdebase4-wallpapers-4.3.5-0.11.18.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): kde4-kgreeter-plugins-4.3.5-0.12.18.1 kdebase4-workspace-4.3.5-0.12.18.1 kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 kdm-4.3.5-0.12.18.1 kwin-4.3.5-0.12.18.1 - SUSE Linux Enterprise Desktop 11 SP3 (noarch): kdebase4-wallpapers-4.3.5-0.11.18.1 References: http://support.novell.com/security/cve/CVE-2013-4132.html http://support.novell.com/security/cve/CVE-2013-4133.html https://bugzilla.novell.com/829857 http://download.suse.com/patch/finder/?keywords=78f3aba766d115c4527d132fa2a51fd7 From sle-updates at lists.suse.com Thu Jul 10 17:04:32 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 11 Jul 2014 01:04:32 +0200 (CEST) Subject: SUSE-SU-2014:0886-1: moderate: Security update for cabextract Message-ID: <20140710230432.C644B3215B@maintenance.suse.de> SUSE Security Update: Security update for cabextract ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0886-1 Rating: moderate References: #627753 Cross-References: CVE-2010-2800 CVE-2010-2801 Affected Products: SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: cabextract was updated to fix two security issues: * CVE-2010-2800: A potential endless loop in decoding files. * CVE-2010-2801: Memory corruption due to integer overflows in buffer read handling. Security Issues references: * CVE-2010-2800 * CVE-2010-2801 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-cabextract-9437 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): cabextract-1.2-2.10.1 References: http://support.novell.com/security/cve/CVE-2010-2800.html http://support.novell.com/security/cve/CVE-2010-2801.html https://bugzilla.novell.com/627753 http://download.suse.com/patch/finder/?keywords=4240bfdd8eedd09d35176ebdd2c4505d From sle-updates at lists.suse.com Thu Jul 10 17:04:48 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 11 Jul 2014 01:04:48 +0200 (CEST) Subject: SUSE-RU-2014:0887-1: Recommended update for crowbar-barclamp-pacemaker Message-ID: <20140710230448.68E1A3215B@maintenance.suse.de> SUSE Recommended Update: Recommended update for crowbar-barclamp-pacemaker ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0887-1 Rating: low References: #882586 Affected Products: SUSE Cloud 3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for Cloud3 provides the following fixes for crowbar-barclamp-pacemaker: * Update to version 1.7+git.1400594230.6419bb6: o fix interpolation of pid o Install xfsprogs if we're using xfs for a DRBD device o sbd: Wait for cluster to be up after corosync restart (bnc#882586) o Fix installation of xfsprogs Contraindications: Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 3: zypper in -t patch sleclo30sp3-crowbar-barclamp-pacemaker-9462 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 3 (noarch): crowbar-barclamp-pacemaker-1.7+git.1400594230.6419bb6-0.7.2 References: https://bugzilla.novell.com/882586 http://download.suse.com/patch/finder/?keywords=4cd51a981219b9db9d825548a81ef85b From sle-updates at lists.suse.com Thu Jul 10 19:04:18 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 11 Jul 2014 03:04:18 +0200 (CEST) Subject: SUSE-RU-2014:0888-1: moderate: Recommended update for xorg-x11-server Message-ID: <20140711010418.16E5C32154@maintenance.suse.de> SUSE Recommended Update: Recommended update for xorg-x11-server ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0888-1 Rating: moderate References: #874903 #878433 #878446 #879019 #880745 #880835 #883516 #883598 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that has 8 recommended fixes can now be installed. Description: This collective update for xorg-x11-server provides the following fixes: * Fix a segmentation fault that can occur when X11 packets are forwarded between a client and a server with different endianess. (bnc#874903) * Free software cursor backing pixmap when transition between screens. This fixes a crash in multi screen support when an assert gets hit. (bnc#880835) * Ignore numlock in Xvnc. Following keys from VNC client will be already modulated by numlock on client side. (bnc#878446) * Fix crash when Xinerama gets disabled after RanR12 is initialized. (bnc#878433) * Prevent crash at the end of 2nd server generation when number of privates differ between 1st and 2nd. (bnc#883598) * Move Xinerama disable when only one screen is present to main loop. (bnc#883598) * Improve Xinerama command line option handling. (bnc#883598) * Work around a possible crash when object belongs to a client that no longer exists. (bnc#883516) * Try to make keyboard bell ring on all devices attached to master keyboard. (bnc#879019) * Implement DeleteInputDeviceRequest in Xvnc to avoid server crash when the Xserver restarts after a server reset. (bnc#880745). Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-xorg-x11-Xvnc-9452 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-xorg-x11-Xvnc-9452 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-xorg-x11-Xvnc-9452 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-xorg-x11-Xvnc-9452 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): xorg-x11-server-sdk-7.4-27.97.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): xorg-x11-Xvnc-7.4-27.97.1 xorg-x11-server-7.4-27.97.1 xorg-x11-server-extra-7.4-27.97.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): xorg-x11-Xvnc-7.4-27.97.1 xorg-x11-server-7.4-27.97.1 xorg-x11-server-extra-7.4-27.97.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): xorg-x11-Xvnc-7.4-27.97.1 xorg-x11-server-7.4-27.97.1 xorg-x11-server-extra-7.4-27.97.1 References: https://bugzilla.novell.com/874903 https://bugzilla.novell.com/878433 https://bugzilla.novell.com/878446 https://bugzilla.novell.com/879019 https://bugzilla.novell.com/880745 https://bugzilla.novell.com/880835 https://bugzilla.novell.com/883516 https://bugzilla.novell.com/883598 http://download.suse.com/patch/finder/?keywords=3c290f262f7ec8e338e08f126e90af98 From sle-updates at lists.suse.com Fri Jul 11 13:04:13 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 11 Jul 2014 21:04:13 +0200 (CEST) Subject: SUSE-RU-2014:0889-1: Recommended update to SUSE Manager Server 2.1 Message-ID: <20140711190413.EC6BF3215C@maintenance.suse.de> SUSE Recommended Update: Recommended update to SUSE Manager Server 2.1 ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0889-1 Rating: low References: #873679 Affected Products: SUSE Manager 1.7 for SLE 11 SP2 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update enables SUSE Manager Server 1.7 to online migrate to SUSE Manager Server 2.1. Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager 1.7 for SLE 11 SP2: zypper in -t patch sleman17sp2-suse-manager-21-migration-9188 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager 1.7 for SLE 11 SP2 (x86_64): SUSE-Manager-Server-2_1-migration-1.7-1.1 suse-manager-server-release-1.7-1.7 References: https://bugzilla.novell.com/873679 http://download.suse.com/patch/finder/?keywords=f0753b1cb15b60610f9eeae64e848162 From sle-updates at lists.suse.com Mon Jul 14 11:04:14 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 14 Jul 2014 19:04:14 +0200 (CEST) Subject: SUSE-SU-2014:0893-1: moderate: Security update for xorg-x11-libX11 Message-ID: <20140714170414.0DF0B3215C@maintenance.suse.de> SUSE Security Update: Security update for xorg-x11-libX11 ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0893-1 Rating: moderate References: #815451 #821664 #824294 Cross-References: CVE-2013-1981 CVE-2013-1997 CVE-2013-2004 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This is a SUSE Linux Enterprise Server 11 SP1 LTSS roll up update of xorg-x11-libX11, fixing a security issues. These issues require connection to a malicious X server to trigger the bugs in client libraries. Security issues fixed: * CVE-2013-1981: Multiple integer overflows in X.org libX11 allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions. * CVE-2013-1997: Multiple buffer overflows in X.org libX11 allowed X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions. * CVE-2013-2004: The (1) GetDatabase and (2) _XimParseStringFile functions in X.org libX11 did not restrict the recursion depth when processing directives to include files, which allowed X servers to cause a denial of service (stack consumption) via a crafted file. Security Issue references: * CVE-2013-1981 * CVE-2013-1997 * CVE-2013-2004 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-xorg-x11-libX11-9384 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): xorg-x11-libX11-7.4-5.11.11.7 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64): xorg-x11-libX11-32bit-7.4-5.11.11.7 References: http://support.novell.com/security/cve/CVE-2013-1981.html http://support.novell.com/security/cve/CVE-2013-1997.html http://support.novell.com/security/cve/CVE-2013-2004.html https://bugzilla.novell.com/815451 https://bugzilla.novell.com/821664 https://bugzilla.novell.com/824294 http://download.suse.com/patch/finder/?keywords=d1609b5cf39d255fcbe312ef9591f918 From sle-updates at lists.suse.com Mon Jul 14 17:04:15 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 15 Jul 2014 01:04:15 +0200 (CEST) Subject: SUSE-SU-2014:0894-1: moderate: Security update for openssl-certs Message-ID: <20140714230415.64BC232154@maintenance.suse.de> SUSE Security Update: Security update for openssl-certs ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0894-1 Rating: moderate References: #881241 Affected Products: SUSE Manager 1.7 for SLE 11 SP2 SLE CLIENT TOOLS 10 for x86_64 SLE CLIENT TOOLS 10 for s390x SLE CLIENT TOOLS 10 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: openssl-certs has been updated to include four new and remove two certificates: * new: Atos_TrustedRoot_2011:2.8.92.51.203.98.44.95.179.50.crt * new: E-Tugra_Certification_Authority:2.8.106.104.62.156.81.155.203.83.crt * new: TeliaSonera_Root_CA_v1:2.17.0.149.190.22.160.247.46.70.241.123.57.130.114.2 50.139.205.150.crt * new: T-TeleSec_GlobalRoot_Class_2:2.1.1.crt * removed: Firmaprofesional_Root_CA:2.1.1.crt * removed: TDC_OCES_Root_CA:2.4.62.72.189.196.crt Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager 1.7 for SLE 11 SP2: zypper in -t patch sleman17sp2-openssl-certs-9340 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager 1.7 for SLE 11 SP2 (noarch): openssl-certs-1.97-0.3.1 - SLE CLIENT TOOLS 10 for x86_64 (noarch): openssl-certs-1.97-0.13.1 - SLE CLIENT TOOLS 10 for s390x (noarch): openssl-certs-1.97-0.13.1 - SLE CLIENT TOOLS 10 (noarch): openssl-certs-1.97-0.13.1 References: https://bugzilla.novell.com/881241 http://download.suse.com/patch/finder/?keywords=2458acb12a58bc5152af9a30060dec0b http://download.suse.com/patch/finder/?keywords=9eefe93c7da9ac193e5bffcf8a424f50 From sle-updates at lists.suse.com Mon Jul 14 17:04:31 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 15 Jul 2014 01:04:31 +0200 (CEST) Subject: SUSE-RU-2014:0895-1: Recommended update for s390-tools Message-ID: <20140714230431.1CAE63215C@maintenance.suse.de> SUSE Recommended Update: Recommended update for s390-tools ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0895-1 Rating: low References: #854286 #864719 #875472 Affected Products: SUSE Linux Enterprise Server 11 SP3 ______________________________________________________________________________ An update that has three recommended fixes can now be installed. Description: This collective update for s390-tools provides the following fixes: * Re-introduce the changes to dasd_configure to not exit immediately upon detecting an unformatted DASD volume. (bnc#864719) * Update iucv_configure to handle more than 10 IUCV interfaces. * Clean up some compilation warnings. (bnc#854286, bnc#875472) * Add collection of journalctl to dbginfo.sh. (bnc#875472) * Show "fcp" instead of "fcp_dump" for fcp re-IPL target in lsreipl. (bnc#875472) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-osasnmpd-9227 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 (s390x): osasnmpd-1.15.0-0.144.1 s390-tools-1.15.0-0.144.1 References: https://bugzilla.novell.com/854286 https://bugzilla.novell.com/864719 https://bugzilla.novell.com/875472 http://download.suse.com/patch/finder/?keywords=1c163b7217620f2efdc6dc3a6341b05a From sle-updates at lists.suse.com Mon Jul 14 19:04:30 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 15 Jul 2014 03:04:30 +0200 (CEST) Subject: SUSE-SU-2014:0896-1: moderate: Security update for GPG2 Message-ID: <20140715010430.CC8B932158@maintenance.suse.de> SUSE Security Update: Security update for GPG2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0896-1 Rating: moderate References: #884130 Cross-References: CVE-2014-4617 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: GPG2 has been updated to fix a possible denial of service. This security issue has been fixed: * Denial of service through infinite loop with garbled compressed data packets (CVE-2014-4617) Security Issues: * CVE-2014-4617 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-gpg2-9433 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-gpg2-9433 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-gpg2-9433 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): gpg2-2.0.9-25.33.39.1 gpg2-lang-2.0.9-25.33.39.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): gpg2-2.0.9-25.33.39.1 gpg2-lang-2.0.9-25.33.39.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): gpg2-2.0.9-25.33.39.1 gpg2-lang-2.0.9-25.33.39.1 References: http://support.novell.com/security/cve/CVE-2014-4617.html https://bugzilla.novell.com/884130 http://download.suse.com/patch/finder/?keywords=4cf6e7364e26bbcac5f693e6f589a59e From sle-updates at lists.suse.com Mon Jul 14 23:04:15 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 15 Jul 2014 07:04:15 +0200 (CEST) Subject: SUSE-SU-2014:0897-1: critical: Security update for flash-player Message-ID: <20140715050415.E2F6C3215C@maintenance.suse.de> SUSE Security Update: Security update for flash-player ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0897-1 Rating: critical References: #886472 Cross-References: CVE-2014-0537 CVE-2014-0539 CVE-2014-4671 Affected Products: SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. It includes one version update. Description: flash-player was updated to version 11.2.202.394 to fix security protection bypass issues. (CVE-2014-0537, CVE-2014-0539, CVE-2014-4671) Security Issues references: * CVE-2014-0537 * CVE-2014-0539 * CVE-2014-4671 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-flash-player-9508 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 11.2.202.394]: flash-player-11.2.202.394-0.3.1 flash-player-gnome-11.2.202.394-0.3.1 flash-player-kde4-11.2.202.394-0.3.1 References: http://support.novell.com/security/cve/CVE-2014-0537.html http://support.novell.com/security/cve/CVE-2014-0539.html http://support.novell.com/security/cve/CVE-2014-4671.html https://bugzilla.novell.com/886472 http://download.suse.com/patch/finder/?keywords=f47f549320b6c960f19e566da4e77c15 From sle-updates at lists.suse.com Tue Jul 15 11:04:13 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 15 Jul 2014 19:04:13 +0200 (CEST) Subject: SUSE-SU-2014:0794-2: moderate: Security update for apache2-mod_wsgi Message-ID: <20140715170413.0FEDE3215D@maintenance.suse.de> SUSE Security Update: Security update for apache2-mod_wsgi ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0794-2 Rating: moderate References: #878550 #878553 Cross-References: CVE-2014-0240 CVE-2014-0242 Affected Products: SUSE Manager Proxy 1.7 for SLE 11 SP2 SUSE Manager 1.7 for SLE 11 SP2 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: The following issues have been fixed in apache2-mod_wsgi: * CVE-2014-0242: Information exposure. (bnc#878553) * CVE-2014-0240: Local privilege escalation. (bnc#878550) Security Issues references: * CVE-2014-0240 * CVE-2014-0242 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager Proxy 1.7 for SLE 11 SP2: zypper in -t patch slemap17sp2-apache2-mod_wsgi-9280 - SUSE Manager 1.7 for SLE 11 SP2: zypper in -t patch sleman17sp2-apache2-mod_wsgi-9280 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager Proxy 1.7 for SLE 11 SP2 (x86_64): apache2-mod_wsgi-3.3-5.5.1 - SUSE Manager 1.7 for SLE 11 SP2 (x86_64): apache2-mod_wsgi-3.3-5.5.1 References: http://support.novell.com/security/cve/CVE-2014-0240.html http://support.novell.com/security/cve/CVE-2014-0242.html https://bugzilla.novell.com/878550 https://bugzilla.novell.com/878553 http://download.suse.com/patch/finder/?keywords=fc7af09c67881ef6973075127975c8db From sle-updates at lists.suse.com Tue Jul 15 17:04:14 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 16 Jul 2014 01:04:14 +0200 (CEST) Subject: SUSE-SU-2014:0898-1: moderate: Security update for xorg-x11-libXt Message-ID: <20140715230414.2614032158@maintenance.suse.de> SUSE Security Update: Security update for xorg-x11-libXt ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0898-1 Rating: moderate References: #815451 #821670 Cross-References: CVE-2013-2002 CVE-2013-2005 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This is a SUSE Linux Enterprise Server 11 SP1 LTSS roll up update of xorg-x11-libXt, fixing security issues. These issues require connection to a malicious X server to trigger the bugs in client libraries. * CVE-2013-2002: Buffer overflow in X.org libXt allowed X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the _XtResourceConfigurationEH function. * CVE-2013-2005: X.org libXt did not check the return value of the XGetWindowProperty function, which allowed X servers to trigger use of an uninitialized pointer and memory corruption via vectors related to the (1) ReqCleanup, (2) HandleSelectionEvents, (3) ReqTimedOut, (4) HandleNormal, and (5) HandleSelectionReplies functions. Security Issues references: * CVE-2013-2002 * CVE-2013-2005 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-xorg-x11-libXt-9390 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): xorg-x11-libXt-7.4-1.19.8 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64): xorg-x11-libXt-32bit-7.4-1.19.8 References: http://support.novell.com/security/cve/CVE-2013-2002.html http://support.novell.com/security/cve/CVE-2013-2005.html https://bugzilla.novell.com/815451 https://bugzilla.novell.com/821670 http://download.suse.com/patch/finder/?keywords=827019064a88342eab5f5c1cd0d70a80 From sle-updates at lists.suse.com Tue Jul 15 17:04:55 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 16 Jul 2014 01:04:55 +0200 (CEST) Subject: SUSE-SU-2014:0899-1: moderate: Security update for Samba Message-ID: <20140715230455.E2A7A3215D@maintenance.suse.de> SUSE Security Update: Security update for Samba ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0899-1 Rating: moderate References: #872396 #879390 #880962 #883758 Cross-References: CVE-2014-0178 CVE-2014-0244 CVE-2014-3493 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that solves three vulnerabilities and has one errata is now available. Description: Samba has been updated to fix two security issues and one non-security issue. These security issues have been fixed: * Fix segmentation fault in smbd_marshal_dir_entry()'s SMB_FIND_FILE_UNIXhandler (CVE-2014-3493) * Fix nmbd denial of service (CVE-2014-0244) * Fix malformed FSCTL_SRV_ENUMERATE_SNAPSHOTS response (CVE-2014-0178) These non-security issues have been fixed: * Fix printer job purging; (bso#10612); (bnc#879390). Security Issue references: * CVE-2014-3493 * CVE-2014-0244 * CVE-2014-0178 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-cifs-mount-9451 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-cifs-mount-9451 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-cifs-mount-9451 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-cifs-mount-9451 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): libldb-devel-3.6.3-0.52.5 libnetapi-devel-3.6.3-0.52.5 libnetapi0-3.6.3-0.52.5 libsmbclient-devel-3.6.3-0.52.5 libsmbsharemodes-devel-3.6.3-0.52.5 libsmbsharemodes0-3.6.3-0.52.5 libtalloc-devel-3.6.3-0.52.5 libtdb-devel-3.6.3-0.52.5 libtevent-devel-3.6.3-0.52.5 libwbclient-devel-3.6.3-0.52.5 samba-devel-3.6.3-0.52.5 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): ldapsmb-1.34b-12.52.5 libldb1-3.6.3-0.52.5 libsmbclient0-3.6.3-0.52.5 libtalloc2-3.6.3-0.52.5 libtdb1-3.6.3-0.52.5 libtevent0-3.6.3-0.52.5 libwbclient0-3.6.3-0.52.5 samba-3.6.3-0.52.5 samba-client-3.6.3-0.52.5 samba-krb-printing-3.6.3-0.52.5 samba-winbind-3.6.3-0.52.5 - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64): libsmbclient0-32bit-3.6.3-0.52.5 libtalloc2-32bit-3.6.3-0.52.5 libtdb1-32bit-3.6.3-0.52.5 libtevent0-32bit-3.6.3-0.52.5 libwbclient0-32bit-3.6.3-0.52.5 samba-32bit-3.6.3-0.52.5 samba-client-32bit-3.6.3-0.52.5 samba-winbind-32bit-3.6.3-0.52.5 - SUSE Linux Enterprise Server 11 SP3 for VMware (noarch): samba-doc-3.6.3-0.52.5 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): ldapsmb-1.34b-12.52.5 libldb1-3.6.3-0.52.5 libsmbclient0-3.6.3-0.52.5 libtalloc2-3.6.3-0.52.5 libtdb1-3.6.3-0.52.5 libtevent0-3.6.3-0.52.5 libwbclient0-3.6.3-0.52.5 samba-3.6.3-0.52.5 samba-client-3.6.3-0.52.5 samba-krb-printing-3.6.3-0.52.5 samba-winbind-3.6.3-0.52.5 - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64): libsmbclient0-32bit-3.6.3-0.52.5 libtalloc2-32bit-3.6.3-0.52.5 libtdb1-32bit-3.6.3-0.52.5 libtevent0-32bit-3.6.3-0.52.5 libwbclient0-32bit-3.6.3-0.52.5 samba-32bit-3.6.3-0.52.5 samba-client-32bit-3.6.3-0.52.5 samba-winbind-32bit-3.6.3-0.52.5 - SUSE Linux Enterprise Server 11 SP3 (noarch): samba-doc-3.6.3-0.52.5 - SUSE Linux Enterprise Server 11 SP3 (ia64): libsmbclient0-x86-3.6.3-0.52.5 libtalloc2-x86-3.6.3-0.52.5 libtdb1-x86-3.6.3-0.52.5 libwbclient0-x86-3.6.3-0.52.5 samba-client-x86-3.6.3-0.52.5 samba-winbind-x86-3.6.3-0.52.5 samba-x86-3.6.3-0.52.5 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): libldb1-3.6.3-0.52.5 libsmbclient0-3.6.3-0.52.5 libtalloc2-3.6.3-0.52.5 libtdb1-3.6.3-0.52.5 libtevent0-3.6.3-0.52.5 libwbclient0-3.6.3-0.52.5 samba-3.6.3-0.52.5 samba-client-3.6.3-0.52.5 samba-krb-printing-3.6.3-0.52.5 samba-winbind-3.6.3-0.52.5 - SUSE Linux Enterprise Desktop 11 SP3 (x86_64): libldb1-32bit-3.6.3-0.52.5 libsmbclient0-32bit-3.6.3-0.52.5 libtalloc2-32bit-3.6.3-0.52.5 libtdb1-32bit-3.6.3-0.52.5 libtevent0-32bit-3.6.3-0.52.5 libwbclient0-32bit-3.6.3-0.52.5 samba-32bit-3.6.3-0.52.5 samba-client-32bit-3.6.3-0.52.5 samba-winbind-32bit-3.6.3-0.52.5 - SUSE Linux Enterprise Desktop 11 SP3 (noarch): samba-doc-3.6.3-0.52.5 References: http://support.novell.com/security/cve/CVE-2014-0178.html http://support.novell.com/security/cve/CVE-2014-0244.html http://support.novell.com/security/cve/CVE-2014-3493.html https://bugzilla.novell.com/872396 https://bugzilla.novell.com/879390 https://bugzilla.novell.com/880962 https://bugzilla.novell.com/883758 http://download.suse.com/patch/finder/?keywords=10fbb89d2b26c9ea95adcf2413c18187 From sle-updates at lists.suse.com Tue Jul 15 17:06:15 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 16 Jul 2014 01:06:15 +0200 (CEST) Subject: SUSE-SU-2014:0900-1: moderate: Security update for xorg-x11-libXfixes Message-ID: <20140715230615.C78BB3215D@maintenance.suse.de> SUSE Security Update: Security update for xorg-x11-libXfixes ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0900-1 Rating: moderate References: #815451 #821667 Cross-References: CVE-2013-1983 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This is a SUSE Linux Enterprise Server 11 SP1 LTSS roll up update of xorg-x11-libXfixes, fixing a security issue. This issue require connection to a malicious X server to trigger the bugs in client libraries. * CVE-2013-1983: Integer overflow in X.org libXfixes allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XFixesGetCursorImage function. Security Issue reference: * CVE-2013-1983 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-xorg-x11-libXfixes-9388 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): xorg-x11-libXfixes-7.4-1.16.8 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64): xorg-x11-libXfixes-32bit-7.4-1.16.8 References: http://support.novell.com/security/cve/CVE-2013-1983.html https://bugzilla.novell.com/815451 https://bugzilla.novell.com/821667 http://download.suse.com/patch/finder/?keywords=0f6bf50c097f5668e99396ee67293bd3 From sle-updates at lists.suse.com Tue Jul 15 17:07:12 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 16 Jul 2014 01:07:12 +0200 (CEST) Subject: SUSE-SU-2014:0901-1: moderate: Security update for Samba Message-ID: <20140715230712.632FA3215D@maintenance.suse.de> SUSE Security Update: Security update for Samba ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0901-1 Rating: moderate References: #437293 #726937 #786677 #844307 #849224 #863748 #865561 #872396 #879390 #880962 #883758 Cross-References: CVE-2013-4496 CVE-2014-0178 CVE-2014-0244 CVE-2014-3493 Affected Products: SUSE Linux Enterprise Server 11 SP2 LTSS ______________________________________________________________________________ An update that solves four vulnerabilities and has 7 fixes is now available. Description: Samba was updated to fix three security issues and several non-security issue. These security issues have been fixed: * Fix segmentation fault in smbd_marshal_dir_entry()'s SMB_FIND_FILE_UNIXhandler. (CVE-2014-3493) * Fix nmbd denial of service. (CVE-2014-0244) * Fix malformed FSCTL_SRV_ENUMERATE_SNAPSHOTS response. (CVE-2014-0178) * Pasword lockout not enforced for SAMR password changes. (CVE-2013-4496) These non-security issues have been fixed: * Fix printer job purging. (bso#10612, bnc#879390) * Depend only on %version with all manual Provides and Requires. (bnc#844307) * Fix problem with server taking too long to respond to aMSG_PRINTER_DRVUPGRADE message. (bso#9942, bnc#863748) * Fix memory leak in printer_list_get_printer(). (bso#9993, bnc#865561) * Depend on %version-%release with all manual Provides and Requires. (bnc#844307) * Remove superfluous obsoletes *-64bit in the ifarch ppc64 case. (bnc#437293) * Fix Winbind 100% CPU utilization caused by domain list corruption. (bso#10358, bnc#786677) * Make winbindd print the interface version when it gets an INTERFACE_VERSIONrequest. (bnc#726937) Security Issues references: * CVE-2014-3493 * CVE-2014-0244 * CVE-2014-0178 * CVE-2013-4496 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 LTSS: zypper in -t patch slessp2-cifs-mount-9431 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64): ldapsmb-1.34b-12.33.41.2 libldb1-3.6.3-0.33.41.2 libsmbclient0-3.6.3-0.33.41.2 libtalloc1-3.4.3-1.54.4 libtalloc2-3.6.3-0.33.41.2 libtdb1-3.6.3-0.33.41.2 libtevent0-3.6.3-0.33.41.2 libwbclient0-3.6.3-0.33.41.2 samba-3.6.3-0.33.41.2 samba-client-3.6.3-0.33.41.2 samba-krb-printing-3.6.3-0.33.41.2 samba-winbind-3.6.3-0.33.41.2 - SUSE Linux Enterprise Server 11 SP2 LTSS (s390x x86_64): libsmbclient0-32bit-3.6.3-0.33.41.2 libtalloc1-32bit-3.4.3-1.54.4 libtalloc2-32bit-3.6.3-0.33.41.2 libtdb1-32bit-3.6.3-0.33.41.2 libtevent0-32bit-3.6.3-0.33.41.2 libwbclient0-32bit-3.6.3-0.33.41.2 samba-32bit-3.6.3-0.33.41.2 samba-client-32bit-3.6.3-0.33.41.2 samba-winbind-32bit-3.6.3-0.33.41.2 - SUSE Linux Enterprise Server 11 SP2 LTSS (noarch): samba-doc-3.6.3-0.33.41.2 References: http://support.novell.com/security/cve/CVE-2013-4496.html http://support.novell.com/security/cve/CVE-2014-0178.html http://support.novell.com/security/cve/CVE-2014-0244.html http://support.novell.com/security/cve/CVE-2014-3493.html https://bugzilla.novell.com/437293 https://bugzilla.novell.com/726937 https://bugzilla.novell.com/786677 https://bugzilla.novell.com/844307 https://bugzilla.novell.com/849224 https://bugzilla.novell.com/863748 https://bugzilla.novell.com/865561 https://bugzilla.novell.com/872396 https://bugzilla.novell.com/879390 https://bugzilla.novell.com/880962 https://bugzilla.novell.com/883758 http://download.suse.com/patch/finder/?keywords=e6bedb260561479f3ebed037356d594b From sle-updates at lists.suse.com Tue Jul 15 17:10:18 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 16 Jul 2014 01:10:18 +0200 (CEST) Subject: SUSE-SU-2014:0902-1: important: Security update for struts Message-ID: <20140715231018.176F23215D@maintenance.suse.de> SUSE Security Update: Security update for struts ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0902-1 Rating: important References: #875455 Cross-References: CVE-2014-0114 Affected Products: SUSE Manager Server SUSE Manager 1.7 for SLE 11 SP2 SUSE Linux Enterprise Software Development Kit 11 SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: Apache Struts was updated to fix a security issue: * CVE-2014-0114: The ActionForm object in Apache Struts 1.x through 1.3.10 allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, which is passed to the getClass method. Security Issue reference: * CVE-2014-0114 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager Server: zypper in -t patch sleman21-struts-9423 - SUSE Manager 1.7 for SLE 11 SP2: zypper in -t patch sleman17sp2-struts-9422 - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-struts-9423 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager Server (noarch): struts-1.2.9-162.33.1 - SUSE Manager 1.7 for SLE 11 SP2 (noarch): struts-1.2.9-162.33.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (noarch): struts-1.2.9-162.33.1 struts-javadoc-1.2.9-162.33.1 struts-manual-1.2.9-162.33.1 References: http://support.novell.com/security/cve/CVE-2014-0114.html https://bugzilla.novell.com/875455 http://download.suse.com/patch/finder/?keywords=11dc6b57770cce35af080f561b5ae3f7 http://download.suse.com/patch/finder/?keywords=fae66e428a1fc1171cb8d6304d55ab38 From sle-updates at lists.suse.com Wed Jul 16 11:04:14 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 16 Jul 2014 19:04:14 +0200 (CEST) Subject: SUSE-SU-2014:0904-1: important: Security update for lzo Message-ID: <20140716170414.3C8FA3215F@maintenance.suse.de> SUSE Security Update: Security update for lzo ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0904-1 Rating: important References: #883947 Cross-References: CVE-2014-4607 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: lzo was updated to fix a potential denial of service issue or possible remote code execution by allowing an attacker, if the LZO decompression algorithm is used in a threaded or kernel context, to corrupt memory structures that control the flow of execution in other contexts. (CVE-2014-4607) Security Issue reference: * CVE-2014-4607 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-liblzo2-2-9506 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-liblzo2-2-9506 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-liblzo2-2-9506 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-liblzo2-2-9506 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): lzo-devel-2.03-12.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP3 (ppc64 s390x x86_64): lzo-devel-32bit-2.03-12.3.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): liblzo2-2-2.03-12.3.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64): liblzo2-2-32bit-2.03-12.3.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): liblzo2-2-2.03-12.3.1 - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64): liblzo2-2-32bit-2.03-12.3.1 - SUSE Linux Enterprise Server 11 SP3 (ia64): liblzo2-2-x86-2.03-12.3.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): liblzo2-2-2.03-12.3.1 - SUSE Linux Enterprise Desktop 11 SP3 (x86_64): liblzo2-2-32bit-2.03-12.3.1 References: http://support.novell.com/security/cve/CVE-2014-4607.html https://bugzilla.novell.com/883947 http://download.suse.com/patch/finder/?keywords=b93b6bf2c8ff803e68676c0bdfba36ed From sle-updates at lists.suse.com Wed Jul 16 18:04:16 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 17 Jul 2014 02:04:16 +0200 (CEST) Subject: SUSE-SU-2014:0905-1: important: Security update for Mozilla Firefox Message-ID: <20140717000416.B4EE532158@maintenance.suse.de> SUSE Security Update: Security update for Mozilla Firefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0905-1 Rating: important References: #881874 Cross-References: CVE-2014-1533 CVE-2014-1534 CVE-2014-1536 CVE-2014-1537 CVE-2014-1538 CVE-2014-1541 CVE-2014-1545 Affected Products: SUSE Linux Enterprise Server 10 SP4 LTSS SUSE Linux Enterprise Server 10 SP3 LTSS ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. It includes three new package versions. Description: Mozilla Firefox has been updated to 24.6.0 to fix the following security issues: * Miscellaneous memory safety hazards (CVE-2014-1533/CVE-2014-1534) * Use-after-free and out of bounds issues found using Address Sanitizer (CVE-2014-1536/CVE-2014-1537/CVE-2014-1538) * Use-after-free with SMIL Animation Controller (CVE-2014-1541) mozilla-nspr has been updated to version 4.10.6 to fix one security issue: * Out of bounds write in NSPR (CVE-2014-1545) Further information can be found at https://www.mozilla.org/security/announce/ Security Issues: * CVE-2014-1533 * CVE-2014-1534 * CVE-2014-1536 * CVE-2014-1537 * CVE-2014-1538 * CVE-2014-1541 * CVE-2014-1545 Package List: - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64) [New Version: 3.16.1 and 4.10.6]: mozilla-nspr-4.10.6-0.5.4 mozilla-nspr-devel-4.10.6-0.5.4 mozilla-nss-3.16.1-0.5.4 mozilla-nss-devel-3.16.1-0.5.4 mozilla-nss-tools-3.16.1-0.5.4 - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64) [New Version: 3.16.1 and 4.10.6]: mozilla-nspr-32bit-4.10.6-0.5.4 mozilla-nss-32bit-3.16.1-0.5.4 - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x) [New Version: 24]: MozillaFirefox-24.6.0esr-0.5.4 MozillaFirefox-branding-SLED-24-0.12.4 MozillaFirefox-translations-24.6.0esr-0.5.4 - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64) [New Version: 3.16.1 and 4.10.6]: mozilla-nspr-4.10.6-0.5.4 mozilla-nspr-devel-4.10.6-0.5.4 mozilla-nss-3.16.1-0.5.4 mozilla-nss-devel-3.16.1-0.5.4 mozilla-nss-tools-3.16.1-0.5.4 - SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64) [New Version: 3.16.1 and 4.10.6]: mozilla-nspr-32bit-4.10.6-0.5.4 mozilla-nss-32bit-3.16.1-0.5.4 - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x) [New Version: 24]: MozillaFirefox-24.6.0esr-0.5.4 MozillaFirefox-branding-SLED-24-0.12.4 MozillaFirefox-translations-24.6.0esr-0.5.4 References: http://support.novell.com/security/cve/CVE-2014-1533.html http://support.novell.com/security/cve/CVE-2014-1534.html http://support.novell.com/security/cve/CVE-2014-1536.html http://support.novell.com/security/cve/CVE-2014-1537.html http://support.novell.com/security/cve/CVE-2014-1538.html http://support.novell.com/security/cve/CVE-2014-1541.html http://support.novell.com/security/cve/CVE-2014-1545.html https://bugzilla.novell.com/881874 http://download.suse.com/patch/finder/?keywords=91a1e0a03ad4b5f6ea664f01e0ac78d0 http://download.suse.com/patch/finder/?keywords=f283bba17813ec06fdb9ae4ef42aeeae From sle-updates at lists.suse.com Wed Jul 16 18:04:42 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 17 Jul 2014 02:04:42 +0200 (CEST) Subject: SUSE-SU-2014:0906-1: moderate: Security update for Mesa Message-ID: <20140717000442.38B1E3215D@maintenance.suse.de> SUSE Security Update: Security update for Mesa ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0906-1 Rating: moderate References: #815451 #821855 Cross-References: CVE-2013-1993 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This is a SUSE Linux Enterprise Server 11 SP1 LTSS roll up update of Mesa, fixing security issues. These issues required connection to a malicious X server to trigger the bugs in client libraries. Security issues fixed: * CVE-2013-1993: Multiple integer overflows in X.org libGLX in Mesa allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XF86DRIOpenConnection and (2) XF86DRIGetClientDriverName functions. Security Issues: * CVE-2013-1993 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-Mesa-9383 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): Mesa-7.7-5.12.38 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64): Mesa-32bit-7.7-5.12.38 References: http://support.novell.com/security/cve/CVE-2013-1993.html https://bugzilla.novell.com/815451 https://bugzilla.novell.com/821855 http://download.suse.com/patch/finder/?keywords=a5e9f18a66e24d049dd31d0f5a22e9f0 From sle-updates at lists.suse.com Wed Jul 16 19:04:14 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 17 Jul 2014 03:04:14 +0200 (CEST) Subject: SUSE-OU-2014:0907-1: important: Optional update for Linux kernel Message-ID: <20140717010414.5E6C632158@maintenance.suse.de> SUSE Optional Update: Optional update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-OU-2014:0907-1 Rating: important References: #767610 #786450 #792271 #821619 #832710 #837563 #840524 #846404 #846690 #847652 #850915 #851426 #851603 #852553 #855126 #857926 #858869 #858870 #858872 #859840 #861636 #861980 #862429 #862934 #863300 #863335 #863410 #863873 #864404 #864464 #865310 #865330 #865882 #866081 #866102 #866615 #866800 #866864 #867362 #867517 #867531 #867723 #867953 #868488 #868528 #868653 #868748 #869033 #869414 #869563 #869934 #870173 #870335 #870450 #870496 #870498 #870576 #870591 #870618 #870877 #870958 #871561 #871634 #871676 #871728 #871854 #871861 #871899 #872188 #872540 #872634 #873061 #873374 #873463 #874108 #874145 #874440 #874577 #875386 #876102 #876114 #876176 #876463 #877013 #877257 #877497 #877775 #878115 #878123 #878274 #878407 #878509 #879921 #879957 #880007 #880357 #880437 #880484 #881571 #881761 #881939 #882324 #883380 #883795 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise High Availability Extension 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 SLE 11 SERVER Unsupported Extras ______________________________________________________________________________ An update that solves 28 vulnerabilities and has 76 fixes is now available. Description: This SUSE Linux Enterprise 11 Service Pack 3 kernel update introduces the bigsmp kernel flavor which is optimized for very large systems. (FATE#317271) Indications: Everyone using the Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Optional Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-kernel-bigsmp-201406-9492 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-kernel-bigsmp-201406-9492 - SUSE Linux Enterprise High Availability Extension 11 SP3: zypper in -t patch slehasp3-kernel-bigsmp-201406-9492 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-kernel-bigsmp-201406-9492 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64): kernel-bigsmp-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (x86_64): iscsitarget-kmp-bigsmp-1.4.20_3.0.101_0.35-0.38.63 kernel-bigsmp-3.0.101-0.35.1 kernel-bigsmp-base-3.0.101-0.35.1 kernel-bigsmp-devel-3.0.101-0.35.1 ofed-kmp-bigsmp-1.5.4.1_3.0.101_0.35-0.13.69 oracleasm-kmp-bigsmp-2.0.5_3.0.101_0.35-7.39.71 - SUSE Linux Enterprise High Availability Extension 11 SP3 (x86_64): cluster-network-kmp-bigsmp-1.4_3.0.101_0.35-2.27.78 drbd-kmp-bigsmp-8.4.4_3.0.101_0.35-0.22.44 gfs2-kmp-bigsmp-2_3.0.101_0.35-0.16.84 ocfs2-kmp-bigsmp-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise Desktop 11 SP3 (x86_64): kernel-bigsmp-devel-3.0.101-0.35.1 - SLE 11 SERVER Unsupported Extras (x86_64): kernel-bigsmp-extra-3.0.101-0.35.1 References: http://support.novell.com/security/cve/CVE-2012-2372.html http://support.novell.com/security/cve/CVE-2013-2929.html http://support.novell.com/security/cve/CVE-2013-4299.html http://support.novell.com/security/cve/CVE-2013-4579.html http://support.novell.com/security/cve/CVE-2013-6382.html http://support.novell.com/security/cve/CVE-2013-7339.html http://support.novell.com/security/cve/CVE-2014-0055.html http://support.novell.com/security/cve/CVE-2014-0077.html http://support.novell.com/security/cve/CVE-2014-0101.html http://support.novell.com/security/cve/CVE-2014-0131.html http://support.novell.com/security/cve/CVE-2014-0155.html http://support.novell.com/security/cve/CVE-2014-1444.html http://support.novell.com/security/cve/CVE-2014-1445.html http://support.novell.com/security/cve/CVE-2014-1446.html http://support.novell.com/security/cve/CVE-2014-1874.html http://support.novell.com/security/cve/CVE-2014-2309.html http://support.novell.com/security/cve/CVE-2014-2523.html http://support.novell.com/security/cve/CVE-2014-2678.html http://support.novell.com/security/cve/CVE-2014-2851.html http://support.novell.com/security/cve/CVE-2014-3122.html http://support.novell.com/security/cve/CVE-2014-3144.html http://support.novell.com/security/cve/CVE-2014-3145.html http://support.novell.com/security/cve/CVE-2014-3917.html http://support.novell.com/security/cve/CVE-2014-4652.html http://support.novell.com/security/cve/CVE-2014-4653.html http://support.novell.com/security/cve/CVE-2014-4654.html http://support.novell.com/security/cve/CVE-2014-4655.html http://support.novell.com/security/cve/CVE-2014-4656.html https://bugzilla.novell.com/767610 https://bugzilla.novell.com/786450 https://bugzilla.novell.com/792271 https://bugzilla.novell.com/821619 https://bugzilla.novell.com/832710 https://bugzilla.novell.com/837563 https://bugzilla.novell.com/840524 https://bugzilla.novell.com/846404 https://bugzilla.novell.com/846690 https://bugzilla.novell.com/847652 https://bugzilla.novell.com/850915 https://bugzilla.novell.com/851426 https://bugzilla.novell.com/851603 https://bugzilla.novell.com/852553 https://bugzilla.novell.com/855126 https://bugzilla.novell.com/857926 https://bugzilla.novell.com/858869 https://bugzilla.novell.com/858870 https://bugzilla.novell.com/858872 https://bugzilla.novell.com/859840 https://bugzilla.novell.com/861636 https://bugzilla.novell.com/861980 https://bugzilla.novell.com/862429 https://bugzilla.novell.com/862934 https://bugzilla.novell.com/863300 https://bugzilla.novell.com/863335 https://bugzilla.novell.com/863410 https://bugzilla.novell.com/863873 https://bugzilla.novell.com/864404 https://bugzilla.novell.com/864464 https://bugzilla.novell.com/865310 https://bugzilla.novell.com/865330 https://bugzilla.novell.com/865882 https://bugzilla.novell.com/866081 https://bugzilla.novell.com/866102 https://bugzilla.novell.com/866615 https://bugzilla.novell.com/866800 https://bugzilla.novell.com/866864 https://bugzilla.novell.com/867362 https://bugzilla.novell.com/867517 https://bugzilla.novell.com/867531 https://bugzilla.novell.com/867723 https://bugzilla.novell.com/867953 https://bugzilla.novell.com/868488 https://bugzilla.novell.com/868528 https://bugzilla.novell.com/868653 https://bugzilla.novell.com/868748 https://bugzilla.novell.com/869033 https://bugzilla.novell.com/869414 https://bugzilla.novell.com/869563 https://bugzilla.novell.com/869934 https://bugzilla.novell.com/870173 https://bugzilla.novell.com/870335 https://bugzilla.novell.com/870450 https://bugzilla.novell.com/870496 https://bugzilla.novell.com/870498 https://bugzilla.novell.com/870576 https://bugzilla.novell.com/870591 https://bugzilla.novell.com/870618 https://bugzilla.novell.com/870877 https://bugzilla.novell.com/870958 https://bugzilla.novell.com/871561 https://bugzilla.novell.com/871634 https://bugzilla.novell.com/871676 https://bugzilla.novell.com/871728 https://bugzilla.novell.com/871854 https://bugzilla.novell.com/871861 https://bugzilla.novell.com/871899 https://bugzilla.novell.com/872188 https://bugzilla.novell.com/872540 https://bugzilla.novell.com/872634 https://bugzilla.novell.com/873061 https://bugzilla.novell.com/873374 https://bugzilla.novell.com/873463 https://bugzilla.novell.com/874108 https://bugzilla.novell.com/874145 https://bugzilla.novell.com/874440 https://bugzilla.novell.com/874577 https://bugzilla.novell.com/875386 https://bugzilla.novell.com/876102 https://bugzilla.novell.com/876114 https://bugzilla.novell.com/876176 https://bugzilla.novell.com/876463 https://bugzilla.novell.com/877013 https://bugzilla.novell.com/877257 https://bugzilla.novell.com/877497 https://bugzilla.novell.com/877775 https://bugzilla.novell.com/878115 https://bugzilla.novell.com/878123 https://bugzilla.novell.com/878274 https://bugzilla.novell.com/878407 https://bugzilla.novell.com/878509 https://bugzilla.novell.com/879921 https://bugzilla.novell.com/879957 https://bugzilla.novell.com/880007 https://bugzilla.novell.com/880357 https://bugzilla.novell.com/880437 https://bugzilla.novell.com/880484 https://bugzilla.novell.com/881571 https://bugzilla.novell.com/881761 https://bugzilla.novell.com/881939 https://bugzilla.novell.com/882324 https://bugzilla.novell.com/883380 https://bugzilla.novell.com/883795 http://download.suse.com/patch/finder/?keywords=2d497350c88d4d379341f72bece8e242 http://download.suse.com/patch/finder/?keywords=8d979a2187c86b94863a4c5fa77b052f From sle-updates at lists.suse.com Wed Jul 16 20:04:14 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 17 Jul 2014 04:04:14 +0200 (CEST) Subject: SUSE-SU-2014:0908-1: important: Security update for Linux kernel Message-ID: <20140717020414.5965E3215B@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0908-1 Rating: important References: #767610 #786450 #792271 #821619 #832710 #837563 #840524 #846404 #846690 #847652 #850915 #851426 #851603 #852553 #855126 #857926 #858869 #858870 #858872 #859840 #861636 #861980 #862429 #862934 #863300 #863335 #863410 #863873 #864404 #864464 #865310 #865330 #865882 #866081 #866102 #866615 #866800 #866864 #867362 #867517 #867531 #867723 #867953 #868488 #868528 #868653 #868748 #869033 #869414 #869563 #869934 #870173 #870335 #870450 #870496 #870498 #870576 #870591 #870618 #870877 #870958 #871561 #871634 #871676 #871728 #871854 #871861 #871899 #872188 #872540 #872634 #873061 #873374 #873463 #874108 #874145 #874440 #874577 #875386 #876102 #876114 #876176 #876463 #877013 #877257 #877497 #877775 #878115 #878123 #878274 #878407 #878509 #879921 #879957 #880007 #880357 #880437 #880484 #881571 #881761 #881939 #882324 #883380 #883724 #883795 #885725 Cross-References: CVE-2012-2372 CVE-2013-2929 CVE-2013-4299 CVE-2013-4579 CVE-2013-6382 CVE-2013-7339 CVE-2014-0055 CVE-2014-0077 CVE-2014-0101 CVE-2014-0131 CVE-2014-0155 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2014-2309 CVE-2014-2523 CVE-2014-2678 CVE-2014-2851 CVE-2014-3122 CVE-2014-3144 CVE-2014-3145 CVE-2014-3917 CVE-2014-4508 CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2014-4699 Affected Products: SUSE Linux Enterprise Real Time Extension 11 SP3 ______________________________________________________________________________ An update that solves 30 vulnerabilities and has 76 fixes is now available. It includes one version update. Description: The SUSE Linux Enterprise 11 Service Pack 3 Real Time Extension kernel has been updated to fix various bugs and security issues. The following security bugs have been fixed: * CVE-2012-2372: The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interfaces own IP address, as demonstrated by rds-ping. (bnc#767610) * CVE-2013-2929: The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h. (bnc#847652) * CVE-2013-4299: Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device. (bnc#846404) * CVE-2013-4579: The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations. (bnc#851426) * CVE-2013-6382: Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c. (bnc#852553) * CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. (bnc#869563) * CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors. (bnc#870173) * CVE-2014-0077: drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. (bnc#870576) * CVE-2014-0101: The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk. (bnc#866102) * CVE-2014-0131: Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. (bnc#867723) * CVE-2014-0155: The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced. (bnc#872540) * CVE-2014-1444: The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call. (bnc#858869) * CVE-2014-1445: The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call. (bnc#858870) * CVE-2014-1446: The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call. (bnc#858872) * CVE-2014-1874: The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context. (bnc#863335) * CVE-2014-2309: The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets. (bnc#867531) * CVE-2014-2523: net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function. (bnc#868653) * CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. (bnc#871561) * CVE-2014-2851: Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter. (bnc#873374) * CVE-2014-3122: The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings. (bnc#876102) * CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced. (bnc#877257) * CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced. (bnc#877257) * CVE-2014-3917: kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number. (bnc#880484) * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number * (bnc#883724) * CVE-2014-4652: Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4653: sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call. (bnc#883795) * CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls. (bnc#883795) * CVE-2014-4656: Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function. (bnc#883795) * CVE-2014-4699: The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. (bnc#885725) Also the following non-security bugs have been fixed: * kernel: avoid page table walk on user space access (bnc#878407, LTC#110316). * spinlock: fix system hang with spin_retry <= 0 (bnc#874145, LTC#110189). * x86/UV: Set n_lshift based on GAM_GR_CONFIG MMR for UV3 (bnc#876176). * x86: Enable multiple CPUs in crash kernel (bnc#846690). * x86/mce: Fix CMCI preemption bugs (bnc#786450). * x86, CMCI: Add proper detection of end of CMCI storms (bnc#786450). * futex: revert back to the explicit waiter counting code (bnc#851603). * futex: avoid race between requeue and wake (bnc#851603). * intel-iommu: fix off-by-one in pagetable freeing (bnc#874577). * ia64: Change default PSR.ac from "1" to "0" (Fix erratum #237) (bnc#874108). * drivers/rtc/interface.c: fix infinite loop in initializing the alarm (bnc#871676). * drm/ast: Fix double lock at PM resume (bnc#883380). * drm/ast: add widescreen + rb modes from X.org driver (v2) (bnc#883380). * drm/ast: deal with bo reserve fail in dirty update path (bnc#883380). * drm/ast: do not attempt to acquire a reservation while in an interrupt handler (bnc#883380). * drm/ast: fix the ast open key function (bnc#883380). * drm/ast: fix value check in cbr_scan2 (bnc#883380). * drm/ast: inline reservations (bnc#883380). * drm/ast: invalidate page tables when pinning a BO (bnc#883380). * drm/ast: rename the mindwm/moutdwm and deinline them (bnc#883380). * drm/ast: resync the dram post code with upstream (bnc#883380). * drm: ast: use drm_can_sleep (bnc#883380). * drm/ast: use drm_modeset_lock_all (bnc#883380). * drm/: Unified handling of unimplemented fb->create_handle (bnc#883380). * drm/mgag200,ast,cirrus: fix regression with drm_can_sleep conversion (bnc#883380). * drm/mgag200: Consolidate depth/bpp handling (bnc#882324). * drm/ast: Initialized data needed to map fbdev memory (bnc#880007). * drm/ast: add AST 2400 support (bnc#880007). * drm/ast: Initialized data needed to map fbdev memory (bnc#880007). * drm/mgag200: on cards with < 2MB VRAM default to 16-bit (bnc#882324). * drm/mgag200: fix typo causing bw limits to be ignored on some chips (bnc#882324). * drm/ttm: do not oops if no invalidate_caches() (bnc#869414). * drm/i915: Break encoder->crtc link separately in intel_sanitize_crtc() (bnc#855126). * dlm: keep listening connection alive with sctp mode (bnc#881939) * series.conf: Clarify comment about Xen kabi adjustments (bnc#876114#c25) * btrfs: fix a crash when running balance and defrag concurrently. * btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). * btrfs: free delayed node outside of root->inode_lock (bnc#866864). * btrfs: return EPERM when deleting a default subvolume (bnc#869934). * btrfs: do not loop on large offsets in readdir (bnc#863300) * sched: Consider pi boosting in setscheduler. * sched: Queue RT tasks to head when prio drops. * sched: Adjust sched_reset_on_fork when nothing else changes. * sched: Fix clock_gettime(CLOCK__CPUTIME_ID) monotonicity (bnc#880357). * sched: Do not allow scheduler time to go backwards (bnc#880357). * sched: Make scale_rt_power() deal with backward clocks (bnc#865310). * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check (bnc#871861). * sched: update_rq_clock() must skip ONE update (bnc#869033, bnc#868528). * tcp: allow to disable cwnd moderation in TCP_CA_Loss state (bnc#879921). * tcp: clear xmit timers in tcp_v4_syn_recv_sock() (bnc#862429). * net: add missing bh_unlock_sock() calls (bnc#862429). * bonding: fix vlan_features computing (bnc#872634). * vlan: more careful checksum features handling (bnc#872634). * xfrm: fix race between netns cleanup and state expire notification (bnc#879957). * xfrm: check peer pointer for null before calling inet_putpeer() (bnc#877775). * ipv6: do not overwrite inetpeer metrics prematurely (bnc#867362). * pagecachelimit: reduce lru_lock contention for heavy parallel kabi fixup: (bnc#878509, bnc#864464). * pagecachelimit: reduce lru_lock contention for heavy parallel reclaim (bnc#878509, bnc#864464). * TTY: serial, cleanup include file (bnc#881571). * TTY: serial, fix includes in some drivers (bnc#881571). * serial_core: Fix race in uart_handle_dcd_change (bnc#881571). * powerpc/perf: Power8 PMU support (bnc#832710). * powerpc/perf: Add support for SIER (bnc#832710). * powerpc/perf: Add regs_no_sipr() (bnc#832710). * powerpc/perf: Add an accessor for regs->result (bnc#832710). * powerpc/perf: Convert mmcra_sipr/sihv() to regs_sipr/sihv() (bnc#832710). * powerpc/perf: Add an explict flag indicating presence of SLOT field (bnc#832710). * swiotlb: do not assume PA 0 is invalid (bnc#865882). * lockref: implement lockless reference count updates using cmpxchg() (FATE#317271). * af_iucv: wrong mapping of sent and confirmed skbs (bnc#878407, LTC#110452). * af_iucv: recvmsg problem for SOCK_STREAM sockets (bnc#878407, LTC#110452). * af_iucv: fix recvmsg by replacing skb_pull() function (bnc#878407, LTC#110452). * qla2xxx: Poll during initialization for ISP25xx and ISP83xx (bnc#837563). * qla2xxx: Fix request queue null dereference (bnc#859840). * lpfc 8.3.41: Fixed SLI3 failing FCP write on check-condition no-sense with residual zero (bnc#850915). * reiserfs: call truncate_setsize under tailpack mutex (bnc#878115). * reiserfs: drop vmtruncate (bnc#878115). * ipvs: handle IPv6 fragments with one-packet scheduling (bnc#861980). * kabi: hide modifications of struct sk_buff done by bnc#861980 fix (bnc#861980). * loop: remove the incorrect write_begin/write_end shortcut (bnc#878123). * watchdog: hpwdt patch to display informative string (bnc#862934). * watchdog: hpwdt: Patch to ignore auxilary iLO devices (bnc#862934). * watchdog: hpwdt: Add check for UEFI bits (bnc#862934). * watchdog: hpwdt.c: Increase version string (bnc#862934). * hpilo: Correct panic when an AUX iLO is detected (bnc#837563). * locking/mutexes: Introduce cancelable MCS lock for adaptive spinning (FATE#317271). * locking/mutexes: Modify the way optimistic spinners are queued (FATE#317271). * locking/mutexes: Return false if task need_resched() in mutex_can_spin_on_owner() (FATE#317271). * mutex: Enable the queuing of mutex spinners with MCS lock (FATE#317271). config: disabled on all flavors * mutex: Queue mutex spinners with MCS lock to reduce cacheline contention (FATE#317271). * memcg: deprecate memory.force_empty knob (bnc#878274). * kabi: protect struct net from bnc#877013 changes (bnc#877013). * netfilter: nfnetlink_queue: add net namespace support for nfnetlink_queue (bnc#877013). * netfilter: make /proc/net/netfilter pernet (bnc#877013). * netfilter: xt_hashlimit: fix proc entry leak in netns destroy path (bnc#871634). * netfilter: xt_hashlimit: fix namespace destroy path (bnc#871634). * netfilter: nf_queue: reject NF_STOLEN verdicts from userspace (bnc#870877). * netfilter: avoid double free in nf_reinject (bnc#870877). * netfilter: ctnetlink: fix race between delete and timeout expiration (bnc#863410). * netfilter: reuse skb->nfct_reasm for ipvs conn reference (bnc#861980). * mm: per-thread vma caching (FATE#317271). config: enable CONFIG_VMA_CACHE for x86_64/bigsmp * mm, hugetlb: improve page-fault scalability (FATE#317271). * mm: vmscan: Do not throttle based on pfmemalloc reserves if node has no ZONE_NORMAL (bnc#870496). * mm: fix off-by-one bug in print_nodes_state() (bnc#792271). * hugetlb: ensure hugepage access is denied if hugepages are not supported (PowerKVM crash when mounting hugetlbfs without hugepage support (bnc#870498)). * SELinux: Increase ebitmap_node size for 64-bit configuration (FATE#317271). * SELinux: Reduce overhead of mls_level_isvalid() function call (FATE#317271). * mutex: Fix debug_mutexes (FATE#317271). * mutex: Fix debug checks (FATE#317271). * locking/mutexes: Unlock the mutex without the wait_lock (FATE#317271). * epoll: do not take the nested ep->mtx on EPOLL_CTL_DEL (FATE#317271). * epoll: do not take global "epmutex" for simple topologies (FATE#317271). * epoll: optimize EPOLL_CTL_DEL using rcu (FATE#317271). * vfs: Fix missing unlock of vfsmount_lock in unlazy_walk (bnc#880437). * dcache: kABI fixes for lockref dentries (FATE#317271). * vfs: make sure we do not have a stale root path if unlazy_walk() fails (FATE#317271). * vfs: fix dentry RCU to refcounting possibly sleeping dput() (FATE#317271). * vfs: use lockref "dead" flag to mark unrecoverably dead dentries (FATE#317271). * vfs: reimplement d_rcu_to_refcount() using lockref_get_or_lock() (FATE#317271). * vfs: Remove second variable named error in __dentry_path (FATE#317271). * make prepend_name() work correctly when called with negative *buflen (FATE#317271). * prepend_path() needs to reinitialize dentry/vfsmount on restarts (FATE#317271). * dcache: get/release read lock in read_seqbegin_or_lock() & friend (FATE#317271). * seqlock: Add a new locking reader type (FATE#317271). * dcache: Translating dentry into pathname without taking rename_lock (FATE#317271). * vfs: make the dentry cache use the lockref infrastructure (FATE#317271). * vfs: Remove dentry->d_lock locking from shrink_dcache_for_umount_subtree() (FATE#317271). * vfs: use lockref_get_not_zero() for optimistic lockless dget_parent() (FATE#317271). * vfs: constify dentry parameter in d_count() (FATE#317271). * helper for reading ->d_count (FATE#317271). * lockref: use arch_mutex_cpu_relax() in CMPXCHG_LOOP() (FATE#317271). * lockref: allow relaxed cmpxchg64 variant for lockless updates (FATE#317271). * lockref: use cmpxchg64 explicitly for lockless updates (FATE#317271). * lockref: add ability to mark lockrefs "dead" (FATE#317271). * lockref: fix docbook argument names (FATE#317271). * lockref: Relax in cmpxchg loop (FATE#317271). * lockref: implement lockless reference count updates using cmpxchg() (FATE#317271). * lockref: uninline lockref helper functions (FATE#317271). * lockref: add lockref_get_or_lock() helper (FATE#317271). * Add new lockref infrastructure reference implementation (FATE#317271). * vfs: make lremovexattr retry once on ESTALE error (bnc#876463). * vfs: make removexattr retry once on ESTALE (bnc#876463). * vfs: make llistxattr retry once on ESTALE error (bnc#876463). * vfs: make listxattr retry once on ESTALE error (bnc#876463). * vfs: make lgetxattr retry once on ESTALE (bnc#876463). * vfs: make getxattr retry once on an ESTALE error (bnc#876463). * vfs: allow lsetxattr() to retry once on ESTALE errors (bnc#876463). * vfs: allow setxattr to retry once on ESTALE errors (bnc#876463). * vfs: allow utimensat() calls to retry once on an ESTALE error (bnc#876463). * vfs: fix user_statfs to retry once on ESTALE errors (bnc#876463). * vfs: make fchownat retry once on ESTALE errors (bnc#876463). * vfs: make fchmodat retry once on ESTALE errors (bnc#876463). * vfs: have chroot retry once on ESTALE error (bnc#876463). * vfs: have chdir retry lookup and call once on ESTALE error (bnc#876463). * vfs: have faccessat retry once on an ESTALE error (bnc#876463). * vfs: have do_sys_truncate retry once on an ESTALE error (bnc#876463). * vfs: fix renameat to retry on ESTALE errors (bnc#876463). * vfs: make do_unlinkat retry once on ESTALE errors (bnc#876463). * vfs: make do_rmdir retry once on ESTALE errors (bnc#876463). * vfs: fix linkat to retry once on ESTALE errors (bnc#876463). * vfs: fix symlinkat to retry on ESTALE errors (bnc#876463). * vfs: fix mkdirat to retry once on an ESTALE error (bnc#876463). * vfs: fix mknodat to retry on ESTALE errors (bnc#876463). * vfs: add a flags argument to user_path_parent (bnc#876463). * vfs: fix readlinkat to retry on ESTALE (bnc#876463). * vfs: make fstatat retry on ESTALE errors from getattr call (bnc#876463). * vfs: add a retry_estale helper function to handle retries on ESTALE (bnc#876463). * crypto: s390 - fix aes,des ctr mode concurrency finding (bnc#874145, LTC#110078). * s390/cio: fix unlocked access of global bitmap (bnc#874145, LTC#109378). * s390/css: stop stsch loop after cc 3 (bnc#874145, LTC#109378). * s390/pci: add kmsg man page (bnc#874145, LTC#109224). * s390/pci/dma: use correct segment boundary size (bnc#866081, LTC#104566). * cio: Fix missing subchannels after CHPID configure on (bnc#866081, LTC#104808). * cio: Fix process hangs during subchannel scan (bnc#866081, LTC#104805). * cio: fix unusable device (bnc#866081, LTC#104168). * qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873). * Fix race between starved list and device removal (bnc#861636). * namei.h: include errno.h (bnc#876463). * ALSA: hda - Implement bind mixer ctls for Conexant (bnc#872188). * ALSA: hda - Fix invalid Auto-Mute Mode enum from cxt codecs (bnc#872188). * ALSA: hda - Fix conflicting Capture Source on cxt codecs (bnc#872188). * ALSA: usb-audio: Fix NULL dereference while quick replugging (bnc#870335). * powerpc: Bring all threads online prior to migration/hibernation (bnc#870591). * powerpc/pseries: Update dynamic cache nodes for suspend/resume operation (bnc#873463). * powerpc/pseries: Device tree should only be updated once after suspend/migrate (bnc#873463). * powerpc/pseries: Expose in kernel device tree update to drmgr (bnc#873463). * powerpc: Add second POWER8 PVR entry (bnc#874440). * libata/ahci: accommodate tag ordered controllers (bnc#871728) * md: try to remove cause of a spinning md thread (bnc#875386). * md: fix up plugging (again) (bnc#866800). * NFSv4: Fix a reboot recovery race when opening a file (bnc#864404). * NFSv4: Ensure delegation recall and byte range lock removal do not conflict (bnc#864404). * NFSv4: Fix up the return values of nfs4_open_delegation_recall (bnc#864404). * NFSv4.1: Do not lose locks when a server reboots during delegation return (bnc#864404). * NFSv4.1: Prevent deadlocks between state recovery and file locking (bnc#864404). * NFSv4: Allow the state manager to mark an open_owner as being recovered (bnc#864404). * NFS: nfs_inode_return_delegation() should always flush dirty data (bnc#864404). * NFSv4: nfs_client_return_marked_delegations cannot flush data (bnc#864404). * NFS: avoid excessive GETATTR request when attributes expired but cached directory is valid (bnc#857926). * seqlock: add "raw_seqcount_begin()" function (bnc#864404). * Allow nfsdv4 to work when fips=1 (bnc#868488). * NFSv4: Add ACCESS operation to OPEN compound (bnc#870958). * NFSv4: Fix unnecessary delegation returns in nfs4_do_open (bnc#870958). * NFSv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873). * NFSv4: nfs4_proc_renew should be declared static (bnc#863873). * NFSv4: do not put ACCESS in OPEN compound if O_EXCL (bnc#870958). * NFS: revalidate on open if dcache is negative (bnc#876463). * NFSD add module parameter to disable delegations (bnc#876463). * Do not lose sockets when nfsd shutdown races with connection timeout (bnc#871854). * timer: Prevent overflow in apply_slack (bnc#873061). * mei: me: do not load the driver if the FW does not support MEI interface (bnc#821619). * ipmi: Reset the KCS timeout when starting error recovery (bnc#870618). * ipmi: Fix a race restarting the timer (bnc#870618). * ipmi: increase KCS timeouts (bnc#870618). * bnx2x: Fix kernel crash and data miscompare after EEH recovery (bnc#881761). * bnx2x: Adapter not recovery from EEH error injection (bnc#881761). * kabi: hide modifications of struct inet_peer done by bnc#867953 fix (bnc#867953). * inetpeer: prevent unlinking from unused list twice (bnc#867953). * Ignore selected taints for tracepoint modules (bnc#870450, FATE#317134). * Use "E" instead of "X" for unsigned module taint flag (bnc#870450,FATE#317134). * Fix: module signature vs tracepoints: add new TAINT_UNSIGNED_MODULE (bnc#870450,FATE#317134). * xhci: extend quirk for Renesas cards (bnc#877497). * scsi: return target failure on EMC inactive snapshot (bnc#840524). * virtio_balloon: do not softlockup on huge balloon changes (bnc#871899). * ch: add refcounting (bnc#867517). * storvsc: NULL pointer dereference fix (bnc#865330). * Unlock the rename_lock in dentry_path() in the case when path is too long (bnc#868748). Security Issue references: * CVE-2012-2372 * CVE-2013-2929 * CVE-2013-4299 * CVE-2013-4579 * CVE-2013-6382 * CVE-2013-7339 * CVE-2014-0055 * CVE-2014-0077 * CVE-2014-0101 * CVE-2014-0131 * CVE-2014-0155 * CVE-2014-1444 * CVE-2014-1445 * CVE-2014-1446 * CVE-2014-1874 * CVE-2014-2309 * CVE-2014-2523 * CVE-2014-2678 * CVE-2014-2851 * CVE-2014-3122 * CVE-2014-3144 * CVE-2014-3145 * CVE-2014-3917 * CVE-2014-4508 * CVE-2014-4652 * CVE-2014-4653 * CVE-2014-4654 * CVE-2014-4655 * CVE-2014-4656 * CVE-2014-4699 Indications: Everyone using the Real Time Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Real Time Extension 11 SP3: zypper in -t patch slertesp3-kernel-9504 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Real Time Extension 11 SP3 (x86_64) [New Version: 3.0.101.rt130]: cluster-network-kmp-rt-1.4_3.0.101_rt130_0.24-2.27.79 cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.24-2.27.79 drbd-kmp-rt-8.4.4_3.0.101_rt130_0.24-0.22.45 drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.24-0.22.45 iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.24-0.38.64 iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.24-0.38.64 kernel-rt-3.0.101.rt130-0.24.1 kernel-rt-base-3.0.101.rt130-0.24.1 kernel-rt-devel-3.0.101.rt130-0.24.1 kernel-rt_trace-3.0.101.rt130-0.24.1 kernel-rt_trace-base-3.0.101.rt130-0.24.1 kernel-rt_trace-devel-3.0.101.rt130-0.24.1 kernel-source-rt-3.0.101.rt130-0.24.1 kernel-syms-rt-3.0.101.rt130-0.24.1 lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.24-0.11.57 lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.24-0.11.57 ocfs2-kmp-rt-1.6_3.0.101_rt130_0.24-0.20.79 ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.24-0.20.79 ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.24-0.13.70 ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.24-0.13.70 References: http://support.novell.com/security/cve/CVE-2012-2372.html http://support.novell.com/security/cve/CVE-2013-2929.html http://support.novell.com/security/cve/CVE-2013-4299.html http://support.novell.com/security/cve/CVE-2013-4579.html http://support.novell.com/security/cve/CVE-2013-6382.html http://support.novell.com/security/cve/CVE-2013-7339.html http://support.novell.com/security/cve/CVE-2014-0055.html http://support.novell.com/security/cve/CVE-2014-0077.html http://support.novell.com/security/cve/CVE-2014-0101.html http://support.novell.com/security/cve/CVE-2014-0131.html http://support.novell.com/security/cve/CVE-2014-0155.html http://support.novell.com/security/cve/CVE-2014-1444.html http://support.novell.com/security/cve/CVE-2014-1445.html http://support.novell.com/security/cve/CVE-2014-1446.html http://support.novell.com/security/cve/CVE-2014-1874.html http://support.novell.com/security/cve/CVE-2014-2309.html http://support.novell.com/security/cve/CVE-2014-2523.html http://support.novell.com/security/cve/CVE-2014-2678.html http://support.novell.com/security/cve/CVE-2014-2851.html http://support.novell.com/security/cve/CVE-2014-3122.html http://support.novell.com/security/cve/CVE-2014-3144.html http://support.novell.com/security/cve/CVE-2014-3145.html http://support.novell.com/security/cve/CVE-2014-3917.html http://support.novell.com/security/cve/CVE-2014-4508.html http://support.novell.com/security/cve/CVE-2014-4652.html http://support.novell.com/security/cve/CVE-2014-4653.html http://support.novell.com/security/cve/CVE-2014-4654.html http://support.novell.com/security/cve/CVE-2014-4655.html http://support.novell.com/security/cve/CVE-2014-4656.html http://support.novell.com/security/cve/CVE-2014-4699.html https://bugzilla.novell.com/767610 https://bugzilla.novell.com/786450 https://bugzilla.novell.com/792271 https://bugzilla.novell.com/821619 https://bugzilla.novell.com/832710 https://bugzilla.novell.com/837563 https://bugzilla.novell.com/840524 https://bugzilla.novell.com/846404 https://bugzilla.novell.com/846690 https://bugzilla.novell.com/847652 https://bugzilla.novell.com/850915 https://bugzilla.novell.com/851426 https://bugzilla.novell.com/851603 https://bugzilla.novell.com/852553 https://bugzilla.novell.com/855126 https://bugzilla.novell.com/857926 https://bugzilla.novell.com/858869 https://bugzilla.novell.com/858870 https://bugzilla.novell.com/858872 https://bugzilla.novell.com/859840 https://bugzilla.novell.com/861636 https://bugzilla.novell.com/861980 https://bugzilla.novell.com/862429 https://bugzilla.novell.com/862934 https://bugzilla.novell.com/863300 https://bugzilla.novell.com/863335 https://bugzilla.novell.com/863410 https://bugzilla.novell.com/863873 https://bugzilla.novell.com/864404 https://bugzilla.novell.com/864464 https://bugzilla.novell.com/865310 https://bugzilla.novell.com/865330 https://bugzilla.novell.com/865882 https://bugzilla.novell.com/866081 https://bugzilla.novell.com/866102 https://bugzilla.novell.com/866615 https://bugzilla.novell.com/866800 https://bugzilla.novell.com/866864 https://bugzilla.novell.com/867362 https://bugzilla.novell.com/867517 https://bugzilla.novell.com/867531 https://bugzilla.novell.com/867723 https://bugzilla.novell.com/867953 https://bugzilla.novell.com/868488 https://bugzilla.novell.com/868528 https://bugzilla.novell.com/868653 https://bugzilla.novell.com/868748 https://bugzilla.novell.com/869033 https://bugzilla.novell.com/869414 https://bugzilla.novell.com/869563 https://bugzilla.novell.com/869934 https://bugzilla.novell.com/870173 https://bugzilla.novell.com/870335 https://bugzilla.novell.com/870450 https://bugzilla.novell.com/870496 https://bugzilla.novell.com/870498 https://bugzilla.novell.com/870576 https://bugzilla.novell.com/870591 https://bugzilla.novell.com/870618 https://bugzilla.novell.com/870877 https://bugzilla.novell.com/870958 https://bugzilla.novell.com/871561 https://bugzilla.novell.com/871634 https://bugzilla.novell.com/871676 https://bugzilla.novell.com/871728 https://bugzilla.novell.com/871854 https://bugzilla.novell.com/871861 https://bugzilla.novell.com/871899 https://bugzilla.novell.com/872188 https://bugzilla.novell.com/872540 https://bugzilla.novell.com/872634 https://bugzilla.novell.com/873061 https://bugzilla.novell.com/873374 https://bugzilla.novell.com/873463 https://bugzilla.novell.com/874108 https://bugzilla.novell.com/874145 https://bugzilla.novell.com/874440 https://bugzilla.novell.com/874577 https://bugzilla.novell.com/875386 https://bugzilla.novell.com/876102 https://bugzilla.novell.com/876114 https://bugzilla.novell.com/876176 https://bugzilla.novell.com/876463 https://bugzilla.novell.com/877013 https://bugzilla.novell.com/877257 https://bugzilla.novell.com/877497 https://bugzilla.novell.com/877775 https://bugzilla.novell.com/878115 https://bugzilla.novell.com/878123 https://bugzilla.novell.com/878274 https://bugzilla.novell.com/878407 https://bugzilla.novell.com/878509 https://bugzilla.novell.com/879921 https://bugzilla.novell.com/879957 https://bugzilla.novell.com/880007 https://bugzilla.novell.com/880357 https://bugzilla.novell.com/880437 https://bugzilla.novell.com/880484 https://bugzilla.novell.com/881571 https://bugzilla.novell.com/881761 https://bugzilla.novell.com/881939 https://bugzilla.novell.com/882324 https://bugzilla.novell.com/883380 https://bugzilla.novell.com/883724 https://bugzilla.novell.com/883795 https://bugzilla.novell.com/885725 http://download.suse.com/patch/finder/?keywords=e918aa8e64a8846df0931a844c091304 From sle-updates at lists.suse.com Wed Jul 16 20:35:25 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 17 Jul 2014 04:35:25 +0200 (CEST) Subject: SUSE-SU-2014:0909-1: important: Security update for Linux kernel Message-ID: <20140717023525.DC85432158@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0909-1 Rating: important References: #767610 #786450 #792271 #821619 #832710 #837563 #840524 #846404 #846690 #847652 #850915 #851426 #851603 #852553 #855126 #857926 #858869 #858870 #858872 #859840 #861636 #861980 #862429 #862934 #863300 #863335 #863410 #863873 #864404 #864464 #865310 #865330 #865882 #866081 #866102 #866615 #866800 #866864 #867362 #867517 #867531 #867723 #867953 #868488 #868528 #868653 #868748 #869033 #869414 #869563 #869934 #870173 #870335 #870450 #870496 #870498 #870576 #870591 #870618 #870877 #870958 #871561 #871634 #871676 #871728 #871854 #871861 #871899 #872188 #872540 #872634 #873061 #873374 #873463 #874108 #874145 #874440 #874577 #875386 #876102 #876114 #876176 #876463 #877013 #877257 #877497 #877775 #878115 #878123 #878274 #878407 #878509 #879921 #879957 #880007 #880357 #880437 #880484 #881571 #881761 #881939 #882324 #883380 #883724 #883795 #885725 Cross-References: CVE-2012-2372 CVE-2013-2929 CVE-2013-4299 CVE-2013-4579 CVE-2013-6382 CVE-2013-7339 CVE-2014-0055 CVE-2014-0077 CVE-2014-0101 CVE-2014-0131 CVE-2014-0155 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2014-2309 CVE-2014-2523 CVE-2014-2678 CVE-2014-2851 CVE-2014-3122 CVE-2014-3144 CVE-2014-3145 CVE-2014-3917 CVE-2014-4508 CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2014-4699 Affected Products: SUSE Linux Enterprise Real Time Extension 11 SP3 ______________________________________________________________________________ An update that solves 30 vulnerabilities and has 76 fixes is now available. It includes one version update. Description: The SUSE Linux Enterprise 11 Service Pack 3 Real Time Extension kernel has been updated to fix various bugs and security issues. The following security bugs have been fixed: * CVE-2012-2372: The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interfaces own IP address, as demonstrated by rds-ping. (bnc#767610) * CVE-2013-2929: The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h. (bnc#847652) * CVE-2013-4299: Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device. (bnc#846404) * CVE-2013-4579: The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations. (bnc#851426) * CVE-2013-6382: Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c. (bnc#852553) * CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. (bnc#869563) * CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors. (bnc#870173) * CVE-2014-0077: drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. (bnc#870576) * CVE-2014-0101: The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk. (bnc#866102) * CVE-2014-0131: Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. (bnc#867723) * CVE-2014-0155: The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced. (bnc#872540) * CVE-2014-1444: The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call. (bnc#858869) * CVE-2014-1445: The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call. (bnc#858870) * CVE-2014-1446: The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call. (bnc#858872) * CVE-2014-1874: The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context. (bnc#863335) * CVE-2014-2309: The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets. (bnc#867531) * CVE-2014-2523: net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function. (bnc#868653) * CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. (bnc#871561) * CVE-2014-2851: Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter. (bnc#873374) * CVE-2014-3122: The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings. (bnc#876102) * CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced. (bnc#877257) * CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced. (bnc#877257) * CVE-2014-3917: kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number. (bnc#880484) * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number * (bnc#883724) * CVE-2014-4652: Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4653: sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call. (bnc#883795) * CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls. (bnc#883795) * CVE-2014-4656: Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function. (bnc#883795) * CVE-2014-4699: The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. (bnc#885725) Also the following non-security bugs have been fixed: * kernel: avoid page table walk on user space access (bnc#878407, LTC#110316). * spinlock: fix system hang with spin_retry <= 0 (bnc#874145, LTC#110189). * x86/UV: Set n_lshift based on GAM_GR_CONFIG MMR for UV3 (bnc#876176). * x86: Enable multiple CPUs in crash kernel (bnc#846690). * x86/mce: Fix CMCI preemption bugs (bnc#786450). * x86, CMCI: Add proper detection of end of CMCI storms (bnc#786450). * futex: revert back to the explicit waiter counting code (bnc#851603). * futex: avoid race between requeue and wake (bnc#851603). * intel-iommu: fix off-by-one in pagetable freeing (bnc#874577). * ia64: Change default PSR.ac from "1" to "0" (Fix erratum #237) (bnc#874108). * drivers/rtc/interface.c: fix infinite loop in initializing the alarm (bnc#871676). * drm/ast: Fix double lock at PM resume (bnc#883380). * drm/ast: add widescreen + rb modes from X.org driver (v2) (bnc#883380). * drm/ast: deal with bo reserve fail in dirty update path (bnc#883380). * drm/ast: do not attempt to acquire a reservation while in an interrupt handler (bnc#883380). * drm/ast: fix the ast open key function (bnc#883380). * drm/ast: fix value check in cbr_scan2 (bnc#883380). * drm/ast: inline reservations (bnc#883380). * drm/ast: invalidate page tables when pinning a BO (bnc#883380). * drm/ast: rename the mindwm/moutdwm and deinline them (bnc#883380). * drm/ast: resync the dram post code with upstream (bnc#883380). * drm: ast: use drm_can_sleep (bnc#883380). * drm/ast: use drm_modeset_lock_all (bnc#883380). * drm/: Unified handling of unimplemented fb->create_handle (bnc#883380). * drm/mgag200,ast,cirrus: fix regression with drm_can_sleep conversion (bnc#883380). * drm/mgag200: Consolidate depth/bpp handling (bnc#882324). * drm/ast: Initialized data needed to map fbdev memory (bnc#880007). * drm/ast: add AST 2400 support (bnc#880007). * drm/ast: Initialized data needed to map fbdev memory (bnc#880007). * drm/mgag200: on cards with < 2MB VRAM default to 16-bit (bnc#882324). * drm/mgag200: fix typo causing bw limits to be ignored on some chips (bnc#882324). * drm/ttm: do not oops if no invalidate_caches() (bnc#869414). * drm/i915: Break encoder->crtc link separately in intel_sanitize_crtc() (bnc#855126). * dlm: keep listening connection alive with sctp mode (bnc#881939) * series.conf: Clarify comment about Xen kabi adjustments (bnc#876114#c25) * btrfs: fix a crash when running balance and defrag concurrently. * btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). * btrfs: free delayed node outside of root->inode_lock (bnc#866864). * btrfs: return EPERM when deleting a default subvolume (bnc#869934). * btrfs: do not loop on large offsets in readdir (bnc#863300) * sched: Consider pi boosting in setscheduler. * sched: Queue RT tasks to head when prio drops. * sched: Adjust sched_reset_on_fork when nothing else changes. * sched: Fix clock_gettime(CLOCK__CPUTIME_ID) monotonicity (bnc#880357). * sched: Do not allow scheduler time to go backwards (bnc#880357). * sched: Make scale_rt_power() deal with backward clocks (bnc#865310). * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check (bnc#871861). * sched: update_rq_clock() must skip ONE update (bnc#869033, bnc#868528). * tcp: allow to disable cwnd moderation in TCP_CA_Loss state (bnc#879921). * tcp: clear xmit timers in tcp_v4_syn_recv_sock() (bnc#862429). * net: add missing bh_unlock_sock() calls (bnc#862429). * bonding: fix vlan_features computing (bnc#872634). * vlan: more careful checksum features handling (bnc#872634). * xfrm: fix race between netns cleanup and state expire notification (bnc#879957). * xfrm: check peer pointer for null before calling inet_putpeer() (bnc#877775). * ipv6: do not overwrite inetpeer metrics prematurely (bnc#867362). * pagecachelimit: reduce lru_lock contention for heavy parallel kabi fixup: (bnc#878509, bnc#864464). * pagecachelimit: reduce lru_lock contention for heavy parallel reclaim (bnc#878509, bnc#864464). * TTY: serial, cleanup include file (bnc#881571). * TTY: serial, fix includes in some drivers (bnc#881571). * serial_core: Fix race in uart_handle_dcd_change (bnc#881571). * powerpc/perf: Power8 PMU support (bnc#832710). * powerpc/perf: Add support for SIER (bnc#832710). * powerpc/perf: Add regs_no_sipr() (bnc#832710). * powerpc/perf: Add an accessor for regs->result (bnc#832710). * powerpc/perf: Convert mmcra_sipr/sihv() to regs_sipr/sihv() (bnc#832710). * powerpc/perf: Add an explict flag indicating presence of SLOT field (bnc#832710). * swiotlb: do not assume PA 0 is invalid (bnc#865882). * lockref: implement lockless reference count updates using cmpxchg() (FATE#317271). * af_iucv: wrong mapping of sent and confirmed skbs (bnc#878407, LTC#110452). * af_iucv: recvmsg problem for SOCK_STREAM sockets (bnc#878407, LTC#110452). * af_iucv: fix recvmsg by replacing skb_pull() function (bnc#878407, LTC#110452). * qla2xxx: Poll during initialization for ISP25xx and ISP83xx (bnc#837563). * qla2xxx: Fix request queue null dereference (bnc#859840). * lpfc 8.3.41: Fixed SLI3 failing FCP write on check-condition no-sense with residual zero (bnc#850915). * reiserfs: call truncate_setsize under tailpack mutex (bnc#878115). * reiserfs: drop vmtruncate (bnc#878115). * ipvs: handle IPv6 fragments with one-packet scheduling (bnc#861980). * kabi: hide modifications of struct sk_buff done by bnc#861980 fix (bnc#861980). * loop: remove the incorrect write_begin/write_end shortcut (bnc#878123). * watchdog: hpwdt patch to display informative string (bnc#862934). * watchdog: hpwdt: Patch to ignore auxilary iLO devices (bnc#862934). * watchdog: hpwdt: Add check for UEFI bits (bnc#862934). * watchdog: hpwdt.c: Increase version string (bnc#862934). * hpilo: Correct panic when an AUX iLO is detected (bnc#837563). * locking/mutexes: Introduce cancelable MCS lock for adaptive spinning (FATE#317271). * locking/mutexes: Modify the way optimistic spinners are queued (FATE#317271). * locking/mutexes: Return false if task need_resched() in mutex_can_spin_on_owner() (FATE#317271). * mutex: Enable the queuing of mutex spinners with MCS lock (FATE#317271). config: disabled on all flavors * mutex: Queue mutex spinners with MCS lock to reduce cacheline contention (FATE#317271). * memcg: deprecate memory.force_empty knob (bnc#878274). * kabi: protect struct net from bnc#877013 changes (bnc#877013). * netfilter: nfnetlink_queue: add net namespace support for nfnetlink_queue (bnc#877013). * netfilter: make /proc/net/netfilter pernet (bnc#877013). * netfilter: xt_hashlimit: fix proc entry leak in netns destroy path (bnc#871634). * netfilter: xt_hashlimit: fix namespace destroy path (bnc#871634). * netfilter: nf_queue: reject NF_STOLEN verdicts from userspace (bnc#870877). * netfilter: avoid double free in nf_reinject (bnc#870877). * netfilter: ctnetlink: fix race between delete and timeout expiration (bnc#863410). * netfilter: reuse skb->nfct_reasm for ipvs conn reference (bnc#861980). * mm: per-thread vma caching (FATE#317271). config: enable CONFIG_VMA_CACHE for x86_64/bigsmp * mm, hugetlb: improve page-fault scalability (FATE#317271). * mm: vmscan: Do not throttle based on pfmemalloc reserves if node has no ZONE_NORMAL (bnc#870496). * mm: fix off-by-one bug in print_nodes_state() (bnc#792271). * hugetlb: ensure hugepage access is denied if hugepages are not supported (PowerKVM crash when mounting hugetlbfs without hugepage support (bnc#870498)). * SELinux: Increase ebitmap_node size for 64-bit configuration (FATE#317271). * SELinux: Reduce overhead of mls_level_isvalid() function call (FATE#317271). * mutex: Fix debug_mutexes (FATE#317271). * mutex: Fix debug checks (FATE#317271). * locking/mutexes: Unlock the mutex without the wait_lock (FATE#317271). * epoll: do not take the nested ep->mtx on EPOLL_CTL_DEL (FATE#317271). * epoll: do not take global "epmutex" for simple topologies (FATE#317271). * epoll: optimize EPOLL_CTL_DEL using rcu (FATE#317271). * vfs: Fix missing unlock of vfsmount_lock in unlazy_walk (bnc#880437). * dcache: kABI fixes for lockref dentries (FATE#317271). * vfs: make sure we do not have a stale root path if unlazy_walk() fails (FATE#317271). * vfs: fix dentry RCU to refcounting possibly sleeping dput() (FATE#317271). * vfs: use lockref "dead" flag to mark unrecoverably dead dentries (FATE#317271). * vfs: reimplement d_rcu_to_refcount() using lockref_get_or_lock() (FATE#317271). * vfs: Remove second variable named error in __dentry_path (FATE#317271). * make prepend_name() work correctly when called with negative *buflen (FATE#317271). * prepend_path() needs to reinitialize dentry/vfsmount on restarts (FATE#317271). * dcache: get/release read lock in read_seqbegin_or_lock() & friend (FATE#317271). * seqlock: Add a new locking reader type (FATE#317271). * dcache: Translating dentry into pathname without taking rename_lock (FATE#317271). * vfs: make the dentry cache use the lockref infrastructure (FATE#317271). * vfs: Remove dentry->d_lock locking from shrink_dcache_for_umount_subtree() (FATE#317271). * vfs: use lockref_get_not_zero() for optimistic lockless dget_parent() (FATE#317271). * vfs: constify dentry parameter in d_count() (FATE#317271). * helper for reading ->d_count (FATE#317271). * lockref: use arch_mutex_cpu_relax() in CMPXCHG_LOOP() (FATE#317271). * lockref: allow relaxed cmpxchg64 variant for lockless updates (FATE#317271). * lockref: use cmpxchg64 explicitly for lockless updates (FATE#317271). * lockref: add ability to mark lockrefs "dead" (FATE#317271). * lockref: fix docbook argument names (FATE#317271). * lockref: Relax in cmpxchg loop (FATE#317271). * lockref: implement lockless reference count updates using cmpxchg() (FATE#317271). * lockref: uninline lockref helper functions (FATE#317271). * lockref: add lockref_get_or_lock() helper (FATE#317271). * Add new lockref infrastructure reference implementation (FATE#317271). * vfs: make lremovexattr retry once on ESTALE error (bnc#876463). * vfs: make removexattr retry once on ESTALE (bnc#876463). * vfs: make llistxattr retry once on ESTALE error (bnc#876463). * vfs: make listxattr retry once on ESTALE error (bnc#876463). * vfs: make lgetxattr retry once on ESTALE (bnc#876463). * vfs: make getxattr retry once on an ESTALE error (bnc#876463). * vfs: allow lsetxattr() to retry once on ESTALE errors (bnc#876463). * vfs: allow setxattr to retry once on ESTALE errors (bnc#876463). * vfs: allow utimensat() calls to retry once on an ESTALE error (bnc#876463). * vfs: fix user_statfs to retry once on ESTALE errors (bnc#876463). * vfs: make fchownat retry once on ESTALE errors (bnc#876463). * vfs: make fchmodat retry once on ESTALE errors (bnc#876463). * vfs: have chroot retry once on ESTALE error (bnc#876463). * vfs: have chdir retry lookup and call once on ESTALE error (bnc#876463). * vfs: have faccessat retry once on an ESTALE error (bnc#876463). * vfs: have do_sys_truncate retry once on an ESTALE error (bnc#876463). * vfs: fix renameat to retry on ESTALE errors (bnc#876463). * vfs: make do_unlinkat retry once on ESTALE errors (bnc#876463). * vfs: make do_rmdir retry once on ESTALE errors (bnc#876463). * vfs: fix linkat to retry once on ESTALE errors (bnc#876463). * vfs: fix symlinkat to retry on ESTALE errors (bnc#876463). * vfs: fix mkdirat to retry once on an ESTALE error (bnc#876463). * vfs: fix mknodat to retry on ESTALE errors (bnc#876463). * vfs: add a flags argument to user_path_parent (bnc#876463). * vfs: fix readlinkat to retry on ESTALE (bnc#876463). * vfs: make fstatat retry on ESTALE errors from getattr call (bnc#876463). * vfs: add a retry_estale helper function to handle retries on ESTALE (bnc#876463). * crypto: s390 - fix aes,des ctr mode concurrency finding (bnc#874145, LTC#110078). * s390/cio: fix unlocked access of global bitmap (bnc#874145, LTC#109378). * s390/css: stop stsch loop after cc 3 (bnc#874145, LTC#109378). * s390/pci: add kmsg man page (bnc#874145, LTC#109224). * s390/pci/dma: use correct segment boundary size (bnc#866081, LTC#104566). * cio: Fix missing subchannels after CHPID configure on (bnc#866081, LTC#104808). * cio: Fix process hangs during subchannel scan (bnc#866081, LTC#104805). * cio: fix unusable device (bnc#866081, LTC#104168). * qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873). * Fix race between starved list and device removal (bnc#861636). * namei.h: include errno.h (bnc#876463). * ALSA: hda - Implement bind mixer ctls for Conexant (bnc#872188). * ALSA: hda - Fix invalid Auto-Mute Mode enum from cxt codecs (bnc#872188). * ALSA: hda - Fix conflicting Capture Source on cxt codecs (bnc#872188). * ALSA: usb-audio: Fix NULL dereference while quick replugging (bnc#870335). * powerpc: Bring all threads online prior to migration/hibernation (bnc#870591). * powerpc/pseries: Update dynamic cache nodes for suspend/resume operation (bnc#873463). * powerpc/pseries: Device tree should only be updated once after suspend/migrate (bnc#873463). * powerpc/pseries: Expose in kernel device tree update to drmgr (bnc#873463). * powerpc: Add second POWER8 PVR entry (bnc#874440). * libata/ahci: accommodate tag ordered controllers (bnc#871728) * md: try to remove cause of a spinning md thread (bnc#875386). * md: fix up plugging (again) (bnc#866800). * NFSv4: Fix a reboot recovery race when opening a file (bnc#864404). * NFSv4: Ensure delegation recall and byte range lock removal do not conflict (bnc#864404). * NFSv4: Fix up the return values of nfs4_open_delegation_recall (bnc#864404). * NFSv4.1: Do not lose locks when a server reboots during delegation return (bnc#864404). * NFSv4.1: Prevent deadlocks between state recovery and file locking (bnc#864404). * NFSv4: Allow the state manager to mark an open_owner as being recovered (bnc#864404). * NFS: nfs_inode_return_delegation() should always flush dirty data (bnc#864404). * NFSv4: nfs_client_return_marked_delegations cannot flush data (bnc#864404). * NFS: avoid excessive GETATTR request when attributes expired but cached directory is valid (bnc#857926). * seqlock: add "raw_seqcount_begin()" function (bnc#864404). * Allow nfsdv4 to work when fips=1 (bnc#868488). * NFSv4: Add ACCESS operation to OPEN compound (bnc#870958). * NFSv4: Fix unnecessary delegation returns in nfs4_do_open (bnc#870958). * NFSv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873). * NFSv4: nfs4_proc_renew should be declared static (bnc#863873). * NFSv4: do not put ACCESS in OPEN compound if O_EXCL (bnc#870958). * NFS: revalidate on open if dcache is negative (bnc#876463). * NFSD add module parameter to disable delegations (bnc#876463). * Do not lose sockets when nfsd shutdown races with connection timeout (bnc#871854). * timer: Prevent overflow in apply_slack (bnc#873061). * mei: me: do not load the driver if the FW does not support MEI interface (bnc#821619). * ipmi: Reset the KCS timeout when starting error recovery (bnc#870618). * ipmi: Fix a race restarting the timer (bnc#870618). * ipmi: increase KCS timeouts (bnc#870618). * bnx2x: Fix kernel crash and data miscompare after EEH recovery (bnc#881761). * bnx2x: Adapter not recovery from EEH error injection (bnc#881761). * kabi: hide modifications of struct inet_peer done by bnc#867953 fix (bnc#867953). * inetpeer: prevent unlinking from unused list twice (bnc#867953). * Ignore selected taints for tracepoint modules (bnc#870450, FATE#317134). * Use "E" instead of "X" for unsigned module taint flag (bnc#870450,FATE#317134). * Fix: module signature vs tracepoints: add new TAINT_UNSIGNED_MODULE (bnc#870450,FATE#317134). * xhci: extend quirk for Renesas cards (bnc#877497). * scsi: return target failure on EMC inactive snapshot (bnc#840524). * virtio_balloon: do not softlockup on huge balloon changes (bnc#871899). * ch: add refcounting (bnc#867517). * storvsc: NULL pointer dereference fix (bnc#865330). * Unlock the rename_lock in dentry_path() in the case when path is too long (bnc#868748). Security Issue references: * CVE-2012-2372 * CVE-2013-2929 * CVE-2013-4299 * CVE-2013-4579 * CVE-2013-6382 * CVE-2013-7339 * CVE-2014-0055 * CVE-2014-0077 * CVE-2014-0101 * CVE-2014-0131 * CVE-2014-0155 * CVE-2014-1444 * CVE-2014-1445 * CVE-2014-1446 * CVE-2014-1874 * CVE-2014-2309 * CVE-2014-2523 * CVE-2014-2678 * CVE-2014-2851 * CVE-2014-3122 * CVE-2014-3144 * CVE-2014-3145 * CVE-2014-3917 * CVE-2014-4508 * CVE-2014-4652 * CVE-2014-4653 * CVE-2014-4654 * CVE-2014-4655 * CVE-2014-4656 * CVE-2014-4699 Indications: Everyone using the Real Time Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Real Time Extension 11 SP3: zypper in -t patch slertesp3-kernel-9504 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Real Time Extension 11 SP3 (x86_64) [New Version: 3.0.101.rt130]: cluster-network-kmp-rt-1.4_3.0.101_rt130_0.24-2.27.79 cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.24-2.27.79 drbd-kmp-rt-8.4.4_3.0.101_rt130_0.24-0.22.45 drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.24-0.22.45 iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.24-0.38.64 iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.24-0.38.64 kernel-rt-3.0.101.rt130-0.24.1 kernel-rt-base-3.0.101.rt130-0.24.1 kernel-rt-devel-3.0.101.rt130-0.24.1 kernel-rt_trace-3.0.101.rt130-0.24.1 kernel-rt_trace-base-3.0.101.rt130-0.24.1 kernel-rt_trace-devel-3.0.101.rt130-0.24.1 kernel-source-rt-3.0.101.rt130-0.24.1 kernel-syms-rt-3.0.101.rt130-0.24.1 lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.24-0.11.57 lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.24-0.11.57 ocfs2-kmp-rt-1.6_3.0.101_rt130_0.24-0.20.79 ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.24-0.20.79 ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.24-0.13.70 ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.24-0.13.70 References: http://support.novell.com/security/cve/CVE-2012-2372.html http://support.novell.com/security/cve/CVE-2013-2929.html http://support.novell.com/security/cve/CVE-2013-4299.html http://support.novell.com/security/cve/CVE-2013-4579.html http://support.novell.com/security/cve/CVE-2013-6382.html http://support.novell.com/security/cve/CVE-2013-7339.html http://support.novell.com/security/cve/CVE-2014-0055.html http://support.novell.com/security/cve/CVE-2014-0077.html http://support.novell.com/security/cve/CVE-2014-0101.html http://support.novell.com/security/cve/CVE-2014-0131.html http://support.novell.com/security/cve/CVE-2014-0155.html http://support.novell.com/security/cve/CVE-2014-1444.html http://support.novell.com/security/cve/CVE-2014-1445.html http://support.novell.com/security/cve/CVE-2014-1446.html http://support.novell.com/security/cve/CVE-2014-1874.html http://support.novell.com/security/cve/CVE-2014-2309.html http://support.novell.com/security/cve/CVE-2014-2523.html http://support.novell.com/security/cve/CVE-2014-2678.html http://support.novell.com/security/cve/CVE-2014-2851.html http://support.novell.com/security/cve/CVE-2014-3122.html http://support.novell.com/security/cve/CVE-2014-3144.html http://support.novell.com/security/cve/CVE-2014-3145.html http://support.novell.com/security/cve/CVE-2014-3917.html http://support.novell.com/security/cve/CVE-2014-4508.html http://support.novell.com/security/cve/CVE-2014-4652.html http://support.novell.com/security/cve/CVE-2014-4653.html http://support.novell.com/security/cve/CVE-2014-4654.html http://support.novell.com/security/cve/CVE-2014-4655.html http://support.novell.com/security/cve/CVE-2014-4656.html http://support.novell.com/security/cve/CVE-2014-4699.html https://bugzilla.novell.com/767610 https://bugzilla.novell.com/786450 https://bugzilla.novell.com/792271 https://bugzilla.novell.com/821619 https://bugzilla.novell.com/832710 https://bugzilla.novell.com/837563 https://bugzilla.novell.com/840524 https://bugzilla.novell.com/846404 https://bugzilla.novell.com/846690 https://bugzilla.novell.com/847652 https://bugzilla.novell.com/850915 https://bugzilla.novell.com/851426 https://bugzilla.novell.com/851603 https://bugzilla.novell.com/852553 https://bugzilla.novell.com/855126 https://bugzilla.novell.com/857926 https://bugzilla.novell.com/858869 https://bugzilla.novell.com/858870 https://bugzilla.novell.com/858872 https://bugzilla.novell.com/859840 https://bugzilla.novell.com/861636 https://bugzilla.novell.com/861980 https://bugzilla.novell.com/862429 https://bugzilla.novell.com/862934 https://bugzilla.novell.com/863300 https://bugzilla.novell.com/863335 https://bugzilla.novell.com/863410 https://bugzilla.novell.com/863873 https://bugzilla.novell.com/864404 https://bugzilla.novell.com/864464 https://bugzilla.novell.com/865310 https://bugzilla.novell.com/865330 https://bugzilla.novell.com/865882 https://bugzilla.novell.com/866081 https://bugzilla.novell.com/866102 https://bugzilla.novell.com/866615 https://bugzilla.novell.com/866800 https://bugzilla.novell.com/866864 https://bugzilla.novell.com/867362 https://bugzilla.novell.com/867517 https://bugzilla.novell.com/867531 https://bugzilla.novell.com/867723 https://bugzilla.novell.com/867953 https://bugzilla.novell.com/868488 https://bugzilla.novell.com/868528 https://bugzilla.novell.com/868653 https://bugzilla.novell.com/868748 https://bugzilla.novell.com/869033 https://bugzilla.novell.com/869414 https://bugzilla.novell.com/869563 https://bugzilla.novell.com/869934 https://bugzilla.novell.com/870173 https://bugzilla.novell.com/870335 https://bugzilla.novell.com/870450 https://bugzilla.novell.com/870496 https://bugzilla.novell.com/870498 https://bugzilla.novell.com/870576 https://bugzilla.novell.com/870591 https://bugzilla.novell.com/870618 https://bugzilla.novell.com/870877 https://bugzilla.novell.com/870958 https://bugzilla.novell.com/871561 https://bugzilla.novell.com/871634 https://bugzilla.novell.com/871676 https://bugzilla.novell.com/871728 https://bugzilla.novell.com/871854 https://bugzilla.novell.com/871861 https://bugzilla.novell.com/871899 https://bugzilla.novell.com/872188 https://bugzilla.novell.com/872540 https://bugzilla.novell.com/872634 https://bugzilla.novell.com/873061 https://bugzilla.novell.com/873374 https://bugzilla.novell.com/873463 https://bugzilla.novell.com/874108 https://bugzilla.novell.com/874145 https://bugzilla.novell.com/874440 https://bugzilla.novell.com/874577 https://bugzilla.novell.com/875386 https://bugzilla.novell.com/876102 https://bugzilla.novell.com/876114 https://bugzilla.novell.com/876176 https://bugzilla.novell.com/876463 https://bugzilla.novell.com/877013 https://bugzilla.novell.com/877257 https://bugzilla.novell.com/877497 https://bugzilla.novell.com/877775 https://bugzilla.novell.com/878115 https://bugzilla.novell.com/878123 https://bugzilla.novell.com/878274 https://bugzilla.novell.com/878407 https://bugzilla.novell.com/878509 https://bugzilla.novell.com/879921 https://bugzilla.novell.com/879957 https://bugzilla.novell.com/880007 https://bugzilla.novell.com/880357 https://bugzilla.novell.com/880437 https://bugzilla.novell.com/880484 https://bugzilla.novell.com/881571 https://bugzilla.novell.com/881761 https://bugzilla.novell.com/881939 https://bugzilla.novell.com/882324 https://bugzilla.novell.com/883380 https://bugzilla.novell.com/883724 https://bugzilla.novell.com/883795 https://bugzilla.novell.com/885725 http://download.suse.com/patch/finder/?keywords=e918aa8e64a8846df0931a844c091304 From sle-updates at lists.suse.com Wed Jul 16 21:04:14 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 17 Jul 2014 05:04:14 +0200 (CEST) Subject: SUSE-SU-2014:0910-1: important: Security update for Linux kernel Message-ID: <20140717030414.387413215D@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0910-1 Rating: important References: #767610 #786450 #792271 #821619 #832710 #837563 #840524 #846404 #846690 #847652 #850915 #851426 #851603 #852553 #855126 #857926 #858869 #858870 #858872 #859840 #861636 #861980 #862429 #862934 #863300 #863335 #863410 #863873 #864404 #864464 #865310 #865330 #865882 #866081 #866102 #866615 #866800 #866864 #867362 #867517 #867531 #867723 #867953 #868488 #868528 #868653 #868748 #869033 #869414 #869563 #869934 #870173 #870335 #870450 #870496 #870498 #870576 #870591 #870618 #870877 #870958 #871561 #871634 #871676 #871728 #871854 #871861 #871899 #872188 #872540 #872634 #873061 #873374 #873463 #874108 #874145 #874440 #874577 #875386 #876102 #876114 #876176 #876463 #877013 #877257 #877497 #877775 #878115 #878123 #878274 #878407 #878509 #879921 #879957 #880007 #880357 #880437 #880484 #881571 #881761 #881939 #882324 #883380 #883795 #885725 Cross-References: CVE-2012-2372 CVE-2013-2929 CVE-2013-4299 CVE-2013-4579 CVE-2013-6382 CVE-2013-7339 CVE-2014-0055 CVE-2014-0077 CVE-2014-0101 CVE-2014-0131 CVE-2014-0155 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2014-2309 CVE-2014-2523 CVE-2014-2678 CVE-2014-2851 CVE-2014-3122 CVE-2014-3144 CVE-2014-3145 CVE-2014-3917 CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2014-4699 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise High Availability Extension 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 SLE 11 SERVER Unsupported Extras ______________________________________________________________________________ An update that solves 29 vulnerabilities and has 76 fixes is now available. It includes one version update. Description: The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix various bugs and security issues. The following security bugs have been fixed: * CVE-2012-2372: The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interfaces own IP address, as demonstrated by rds-ping. (bnc#767610) * CVE-2013-2929: The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h. (bnc#847652) * CVE-2013-4299: Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device. (bnc#846404) * CVE-2013-4579: The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations. (bnc#851426) * CVE-2013-6382: Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c. (bnc#852553) * CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. (bnc#869563) * CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors. (bnc#870173) * CVE-2014-0077: drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. (bnc#870576) * CVE-2014-0101: The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk. (bnc#866102) * CVE-2014-0131: Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. (bnc#867723) * CVE-2014-0155: The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced. (bnc#872540) * CVE-2014-1444: The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call. (bnc#858869) * CVE-2014-1445: The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call. (bnc#858870) * CVE-2014-1446: The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call. (bnc#858872) * CVE-2014-1874: The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context. (bnc#863335) * CVE-2014-2309: The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets. (bnc#867531) * CVE-2014-2523: net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function. (bnc#868653) * CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. (bnc#871561) * CVE-2014-2851: Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter. (bnc#873374) * CVE-2014-3122: The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings. (bnc#876102) * CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced. (bnc#877257) * CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced. (bnc#877257) * CVE-2014-3917: kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number. (bnc#880484) * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number * (bnc#883724) * CVE-2014-4652: Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4653: sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call. (bnc#883795) * CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls. (bnc#883795) * CVE-2014-4656: Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function. (bnc#883795) * CVE-2014-4699: The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. (bnc#885725) Also the following non-security bugs have been fixed: * kernel: avoid page table walk on user space access (bnc#878407, LTC#110316). * spinlock: fix system hang with spin_retry <= 0 (bnc#874145, LTC#110189). * x86/UV: Set n_lshift based on GAM_GR_CONFIG MMR for UV3 (bnc#876176). * x86: Enable multiple CPUs in crash kernel (bnc#846690). * x86/mce: Fix CMCI preemption bugs (bnc#786450). * x86, CMCI: Add proper detection of end of CMCI storms (bnc#786450). * futex: revert back to the explicit waiter counting code (bnc#851603). * futex: avoid race between requeue and wake (bnc#851603). * intel-iommu: fix off-by-one in pagetable freeing (bnc#874577). * ia64: Change default PSR.ac from "1" to "0" (Fix erratum #237) (bnc#874108). * drivers/rtc/interface.c: fix infinite loop in initializing the alarm (bnc#871676). * drm/ast: Fix double lock at PM resume (bnc#883380). * drm/ast: add widescreen + rb modes from X.org driver (v2) (bnc#883380). * drm/ast: deal with bo reserve fail in dirty update path (bnc#883380). * drm/ast: do not attempt to acquire a reservation while in an interrupt handler (bnc#883380). * drm/ast: fix the ast open key function (bnc#883380). * drm/ast: fix value check in cbr_scan2 (bnc#883380). * drm/ast: inline reservations (bnc#883380). * drm/ast: invalidate page tables when pinning a BO (bnc#883380). * drm/ast: rename the mindwm/moutdwm and deinline them (bnc#883380). * drm/ast: resync the dram post code with upstream (bnc#883380). * drm: ast: use drm_can_sleep (bnc#883380). * drm/ast: use drm_modeset_lock_all (bnc#883380). * drm/: Unified handling of unimplemented fb->create_handle (bnc#883380). * drm/mgag200,ast,cirrus: fix regression with drm_can_sleep conversion (bnc#883380). * drm/mgag200: Consolidate depth/bpp handling (bnc#882324). * drm/ast: Initialized data needed to map fbdev memory (bnc#880007). * drm/ast: add AST 2400 support (bnc#880007). * drm/ast: Initialized data needed to map fbdev memory (bnc#880007). * drm/mgag200: on cards with < 2MB VRAM default to 16-bit (bnc#882324). * drm/mgag200: fix typo causing bw limits to be ignored on some chips (bnc#882324). * drm/ttm: do not oops if no invalidate_caches() (bnc#869414). * drm/i915: Break encoder->crtc link separately in intel_sanitize_crtc() (bnc#855126). * dlm: keep listening connection alive with sctp mode (bnc#881939) * series.conf: Clarify comment about Xen kabi adjustments (bnc#876114#c25) * btrfs: fix a crash when running balance and defrag concurrently. * btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). * btrfs: free delayed node outside of root->inode_lock (bnc#866864). * btrfs: return EPERM when deleting a default subvolume (bnc#869934). * btrfs: do not loop on large offsets in readdir (bnc#863300) * sched: Consider pi boosting in setscheduler. * sched: Queue RT tasks to head when prio drops. * sched: Adjust sched_reset_on_fork when nothing else changes. * sched: Fix clock_gettime(CLOCK__CPUTIME_ID) monotonicity (bnc#880357). * sched: Do not allow scheduler time to go backwards (bnc#880357). * sched: Make scale_rt_power() deal with backward clocks (bnc#865310). * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check (bnc#871861). * sched: update_rq_clock() must skip ONE update (bnc#869033, bnc#868528). * tcp: allow to disable cwnd moderation in TCP_CA_Loss state (bnc#879921). * tcp: clear xmit timers in tcp_v4_syn_recv_sock() (bnc#862429). * net: add missing bh_unlock_sock() calls (bnc#862429). * bonding: fix vlan_features computing (bnc#872634). * vlan: more careful checksum features handling (bnc#872634). * xfrm: fix race between netns cleanup and state expire notification (bnc#879957). * xfrm: check peer pointer for null before calling inet_putpeer() (bnc#877775). * ipv6: do not overwrite inetpeer metrics prematurely (bnc#867362). * pagecachelimit: reduce lru_lock contention for heavy parallel kabi fixup: (bnc#878509, bnc#864464). * pagecachelimit: reduce lru_lock contention for heavy parallel reclaim (bnc#878509, bnc#864464). * TTY: serial, cleanup include file (bnc#881571). * TTY: serial, fix includes in some drivers (bnc#881571). * serial_core: Fix race in uart_handle_dcd_change (bnc#881571). * powerpc/perf: Power8 PMU support (bnc#832710). * powerpc/perf: Add support for SIER (bnc#832710). * powerpc/perf: Add regs_no_sipr() (bnc#832710). * powerpc/perf: Add an accessor for regs->result (bnc#832710). * powerpc/perf: Convert mmcra_sipr/sihv() to regs_sipr/sihv() (bnc#832710). * powerpc/perf: Add an explict flag indicating presence of SLOT field (bnc#832710). * swiotlb: do not assume PA 0 is invalid (bnc#865882). * lockref: implement lockless reference count updates using cmpxchg() (FATE#317271). * af_iucv: wrong mapping of sent and confirmed skbs (bnc#878407, LTC#110452). * af_iucv: recvmsg problem for SOCK_STREAM sockets (bnc#878407, LTC#110452). * af_iucv: fix recvmsg by replacing skb_pull() function (bnc#878407, LTC#110452). * qla2xxx: Poll during initialization for ISP25xx and ISP83xx (bnc#837563). * qla2xxx: Fix request queue null dereference (bnc#859840). * lpfc 8.3.41: Fixed SLI3 failing FCP write on check-condition no-sense with residual zero (bnc#850915). * reiserfs: call truncate_setsize under tailpack mutex (bnc#878115). * reiserfs: drop vmtruncate (bnc#878115). * ipvs: handle IPv6 fragments with one-packet scheduling (bnc#861980). * kabi: hide modifications of struct sk_buff done by bnc#861980 fix (bnc#861980). * loop: remove the incorrect write_begin/write_end shortcut (bnc#878123). * watchdog: hpwdt patch to display informative string (bnc#862934). * watchdog: hpwdt: Patch to ignore auxilary iLO devices (bnc#862934). * watchdog: hpwdt: Add check for UEFI bits (bnc#862934). * watchdog: hpwdt.c: Increase version string (bnc#862934). * hpilo: Correct panic when an AUX iLO is detected (bnc#837563). * locking/mutexes: Introduce cancelable MCS lock for adaptive spinning (FATE#317271). * locking/mutexes: Modify the way optimistic spinners are queued (FATE#317271). * locking/mutexes: Return false if task need_resched() in mutex_can_spin_on_owner() (FATE#317271). * mutex: Enable the queuing of mutex spinners with MCS lock (FATE#317271). config: disabled on all flavors * mutex: Queue mutex spinners with MCS lock to reduce cacheline contention (FATE#317271). * memcg: deprecate memory.force_empty knob (bnc#878274). * kabi: protect struct net from bnc#877013 changes (bnc#877013). * netfilter: nfnetlink_queue: add net namespace support for nfnetlink_queue (bnc#877013). * netfilter: make /proc/net/netfilter pernet (bnc#877013). * netfilter: xt_hashlimit: fix proc entry leak in netns destroy path (bnc#871634). * netfilter: xt_hashlimit: fix namespace destroy path (bnc#871634). * netfilter: nf_queue: reject NF_STOLEN verdicts from userspace (bnc#870877). * netfilter: avoid double free in nf_reinject (bnc#870877). * netfilter: ctnetlink: fix race between delete and timeout expiration (bnc#863410). * netfilter: reuse skb->nfct_reasm for ipvs conn reference (bnc#861980). * mm: per-thread vma caching (FATE#317271). config: enable CONFIG_VMA_CACHE for x86_64/bigsmp * mm, hugetlb: improve page-fault scalability (FATE#317271). * mm: vmscan: Do not throttle based on pfmemalloc reserves if node has no ZONE_NORMAL (bnc#870496). * mm: fix off-by-one bug in print_nodes_state() (bnc#792271). * hugetlb: ensure hugepage access is denied if hugepages are not supported (PowerKVM crash when mounting hugetlbfs without hugepage support (bnc#870498)). * SELinux: Increase ebitmap_node size for 64-bit configuration (FATE#317271). * SELinux: Reduce overhead of mls_level_isvalid() function call (FATE#317271). * mutex: Fix debug_mutexes (FATE#317271). * mutex: Fix debug checks (FATE#317271). * locking/mutexes: Unlock the mutex without the wait_lock (FATE#317271). * epoll: do not take the nested ep->mtx on EPOLL_CTL_DEL (FATE#317271). * epoll: do not take global "epmutex" for simple topologies (FATE#317271). * epoll: optimize EPOLL_CTL_DEL using rcu (FATE#317271). * vfs: Fix missing unlock of vfsmount_lock in unlazy_walk (bnc#880437). * dcache: kABI fixes for lockref dentries (FATE#317271). * vfs: make sure we do not have a stale root path if unlazy_walk() fails (FATE#317271). * vfs: fix dentry RCU to refcounting possibly sleeping dput() (FATE#317271). * vfs: use lockref "dead" flag to mark unrecoverably dead dentries (FATE#317271). * vfs: reimplement d_rcu_to_refcount() using lockref_get_or_lock() (FATE#317271). * vfs: Remove second variable named error in __dentry_path (FATE#317271). * make prepend_name() work correctly when called with negative *buflen (FATE#317271). * prepend_path() needs to reinitialize dentry/vfsmount on restarts (FATE#317271). * dcache: get/release read lock in read_seqbegin_or_lock() & friend (FATE#317271). * seqlock: Add a new locking reader type (FATE#317271). * dcache: Translating dentry into pathname without taking rename_lock (FATE#317271). * vfs: make the dentry cache use the lockref infrastructure (FATE#317271). * vfs: Remove dentry->d_lock locking from shrink_dcache_for_umount_subtree() (FATE#317271). * vfs: use lockref_get_not_zero() for optimistic lockless dget_parent() (FATE#317271). * vfs: constify dentry parameter in d_count() (FATE#317271). * helper for reading ->d_count (FATE#317271). * lockref: use arch_mutex_cpu_relax() in CMPXCHG_LOOP() (FATE#317271). * lockref: allow relaxed cmpxchg64 variant for lockless updates (FATE#317271). * lockref: use cmpxchg64 explicitly for lockless updates (FATE#317271). * lockref: add ability to mark lockrefs "dead" (FATE#317271). * lockref: fix docbook argument names (FATE#317271). * lockref: Relax in cmpxchg loop (FATE#317271). * lockref: implement lockless reference count updates using cmpxchg() (FATE#317271). * lockref: uninline lockref helper functions (FATE#317271). * lockref: add lockref_get_or_lock() helper (FATE#317271). * Add new lockref infrastructure reference implementation (FATE#317271). * vfs: make lremovexattr retry once on ESTALE error (bnc#876463). * vfs: make removexattr retry once on ESTALE (bnc#876463). * vfs: make llistxattr retry once on ESTALE error (bnc#876463). * vfs: make listxattr retry once on ESTALE error (bnc#876463). * vfs: make lgetxattr retry once on ESTALE (bnc#876463). * vfs: make getxattr retry once on an ESTALE error (bnc#876463). * vfs: allow lsetxattr() to retry once on ESTALE errors (bnc#876463). * vfs: allow setxattr to retry once on ESTALE errors (bnc#876463). * vfs: allow utimensat() calls to retry once on an ESTALE error (bnc#876463). * vfs: fix user_statfs to retry once on ESTALE errors (bnc#876463). * vfs: make fchownat retry once on ESTALE errors (bnc#876463). * vfs: make fchmodat retry once on ESTALE errors (bnc#876463). * vfs: have chroot retry once on ESTALE error (bnc#876463). * vfs: have chdir retry lookup and call once on ESTALE error (bnc#876463). * vfs: have faccessat retry once on an ESTALE error (bnc#876463). * vfs: have do_sys_truncate retry once on an ESTALE error (bnc#876463). * vfs: fix renameat to retry on ESTALE errors (bnc#876463). * vfs: make do_unlinkat retry once on ESTALE errors (bnc#876463). * vfs: make do_rmdir retry once on ESTALE errors (bnc#876463). * vfs: fix linkat to retry once on ESTALE errors (bnc#876463). * vfs: fix symlinkat to retry on ESTALE errors (bnc#876463). * vfs: fix mkdirat to retry once on an ESTALE error (bnc#876463). * vfs: fix mknodat to retry on ESTALE errors (bnc#876463). * vfs: add a flags argument to user_path_parent (bnc#876463). * vfs: fix readlinkat to retry on ESTALE (bnc#876463). * vfs: make fstatat retry on ESTALE errors from getattr call (bnc#876463). * vfs: add a retry_estale helper function to handle retries on ESTALE (bnc#876463). * crypto: s390 - fix aes,des ctr mode concurrency finding (bnc#874145, LTC#110078). * s390/cio: fix unlocked access of global bitmap (bnc#874145, LTC#109378). * s390/css: stop stsch loop after cc 3 (bnc#874145, LTC#109378). * s390/pci: add kmsg man page (bnc#874145, LTC#109224). * s390/pci/dma: use correct segment boundary size (bnc#866081, LTC#104566). * cio: Fix missing subchannels after CHPID configure on (bnc#866081, LTC#104808). * cio: Fix process hangs during subchannel scan (bnc#866081, LTC#104805). * cio: fix unusable device (bnc#866081, LTC#104168). * qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873). * Fix race between starved list and device removal (bnc#861636). * namei.h: include errno.h (bnc#876463). * ALSA: hda - Implement bind mixer ctls for Conexant (bnc#872188). * ALSA: hda - Fix invalid Auto-Mute Mode enum from cxt codecs (bnc#872188). * ALSA: hda - Fix conflicting Capture Source on cxt codecs (bnc#872188). * ALSA: usb-audio: Fix NULL dereference while quick replugging (bnc#870335). * powerpc: Bring all threads online prior to migration/hibernation (bnc#870591). * powerpc/pseries: Update dynamic cache nodes for suspend/resume operation (bnc#873463). * powerpc/pseries: Device tree should only be updated once after suspend/migrate (bnc#873463). * powerpc/pseries: Expose in kernel device tree update to drmgr (bnc#873463). * powerpc: Add second POWER8 PVR entry (bnc#874440). * libata/ahci: accommodate tag ordered controllers (bnc#871728) * md: try to remove cause of a spinning md thread (bnc#875386). * md: fix up plugging (again) (bnc#866800). * NFSv4: Fix a reboot recovery race when opening a file (bnc#864404). * NFSv4: Ensure delegation recall and byte range lock removal do not conflict (bnc#864404). * NFSv4: Fix up the return values of nfs4_open_delegation_recall (bnc#864404). * NFSv4.1: Do not lose locks when a server reboots during delegation return (bnc#864404). * NFSv4.1: Prevent deadlocks between state recovery and file locking (bnc#864404). * NFSv4: Allow the state manager to mark an open_owner as being recovered (bnc#864404). * NFS: nfs_inode_return_delegation() should always flush dirty data (bnc#864404). * NFSv4: nfs_client_return_marked_delegations cannot flush data (bnc#864404). * NFS: avoid excessive GETATTR request when attributes expired but cached directory is valid (bnc#857926). * seqlock: add "raw_seqcount_begin()" function (bnc#864404). * Allow nfsdv4 to work when fips=1 (bnc#868488). * NFSv4: Add ACCESS operation to OPEN compound (bnc#870958). * NFSv4: Fix unnecessary delegation returns in nfs4_do_open (bnc#870958). * NFSv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873). * NFSv4: nfs4_proc_renew should be declared static (bnc#863873). * NFSv4: do not put ACCESS in OPEN compound if O_EXCL (bnc#870958). * NFS: revalidate on open if dcache is negative (bnc#876463). * NFSD add module parameter to disable delegations (bnc#876463). * Do not lose sockets when nfsd shutdown races with connection timeout (bnc#871854). * timer: Prevent overflow in apply_slack (bnc#873061). * mei: me: do not load the driver if the FW does not support MEI interface (bnc#821619). * ipmi: Reset the KCS timeout when starting error recovery (bnc#870618). * ipmi: Fix a race restarting the timer (bnc#870618). * ipmi: increase KCS timeouts (bnc#870618). * bnx2x: Fix kernel crash and data miscompare after EEH recovery (bnc#881761). * bnx2x: Adapter not recovery from EEH error injection (bnc#881761). * kabi: hide modifications of struct inet_peer done by bnc#867953 fix (bnc#867953). * inetpeer: prevent unlinking from unused list twice (bnc#867953). * Ignore selected taints for tracepoint modules (bnc#870450, FATE#317134). * Use "E" instead of "X" for unsigned module taint flag (bnc#870450,FATE#317134). * Fix: module signature vs tracepoints: add new TAINT_UNSIGNED_MODULE (bnc#870450,FATE#317134). * xhci: extend quirk for Renesas cards (bnc#877497). * scsi: return target failure on EMC inactive snapshot (bnc#840524). * virtio_balloon: do not softlockup on huge balloon changes (bnc#871899). * ch: add refcounting (bnc#867517). * storvsc: NULL pointer dereference fix (bnc#865330). * Unlock the rename_lock in dentry_path() in the case when path is too long (bnc#868748). Security Issue references: * CVE-2012-2372 * CVE-2013-2929 * CVE-2013-4299 * CVE-2013-4579 * CVE-2013-6382 * CVE-2013-7339 * CVE-2014-0055 * CVE-2014-0077 * CVE-2014-0101 * CVE-2014-0131 * CVE-2014-0155 * CVE-2014-1444 * CVE-2014-1445 * CVE-2014-1446 * CVE-2014-1874 * CVE-2014-2309 * CVE-2014-2523 * CVE-2014-2678 * CVE-2014-2851 * CVE-2014-3122 * CVE-2014-3144 * CVE-2014-3145 * CVE-2014-3917 * CVE-2014-4508 * CVE-2014-4652 * CVE-2014-4653 * CVE-2014-4654 * CVE-2014-4655 * CVE-2014-4656 * CVE-2014-4699 Indications: Everyone using the Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-kernel-9488 slessp3-kernel-9493 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-kernel-9488 slessp3-kernel-9489 slessp3-kernel-9490 slessp3-kernel-9491 slessp3-kernel-9493 - SUSE Linux Enterprise High Availability Extension 11 SP3: zypper in -t patch slehasp3-kernel-9488 slehasp3-kernel-9489 slehasp3-kernel-9490 slehasp3-kernel-9491 slehasp3-kernel-9493 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-kernel-9488 sledsp3-kernel-9493 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.35.1 kernel-default-base-3.0.101-0.35.1 kernel-default-devel-3.0.101-0.35.1 kernel-source-3.0.101-0.35.1 kernel-syms-3.0.101-0.35.1 kernel-trace-3.0.101-0.35.1 kernel-trace-base-3.0.101-0.35.1 kernel-trace-devel-3.0.101-0.35.1 kernel-xen-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.35.1 kernel-pae-base-3.0.101-0.35.1 kernel-pae-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.35.1 kernel-default-base-3.0.101-0.35.1 kernel-default-devel-3.0.101-0.35.1 kernel-source-3.0.101-0.35.1 kernel-syms-3.0.101-0.35.1 kernel-trace-3.0.101-0.35.1 kernel-trace-base-3.0.101-0.35.1 kernel-trace-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (i586 x86_64) [New Version: 3.0.101]: kernel-ec2-3.0.101-0.35.1 kernel-ec2-base-3.0.101-0.35.1 kernel-ec2-devel-3.0.101-0.35.1 kernel-xen-3.0.101-0.35.1 kernel-xen-base-3.0.101-0.35.1 kernel-xen-devel-3.0.101-0.35.1 xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 - SUSE Linux Enterprise Server 11 SP3 (s390x) [New Version: 3.0.101]: kernel-default-man-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (ppc64) [New Version: 3.0.101]: kernel-ppc64-3.0.101-0.35.1 kernel-ppc64-base-3.0.101-0.35.1 kernel-ppc64-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.35.1 kernel-pae-base-3.0.101-0.35.1 kernel-pae-devel-3.0.101-0.35.1 xen-kmp-pae-4.2.4_02_3.0.101_0.35-0.7.45 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64): cluster-network-kmp-default-1.4_3.0.101_0.35-2.27.78 cluster-network-kmp-trace-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-default-2_3.0.101_0.35-0.16.84 gfs2-kmp-trace-2_3.0.101_0.35-0.16.84 ocfs2-kmp-default-1.6_3.0.101_0.35-0.20.78 ocfs2-kmp-trace-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 x86_64): cluster-network-kmp-xen-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-xen-2_3.0.101_0.35-0.16.84 ocfs2-kmp-xen-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise High Availability Extension 11 SP3 (ppc64): cluster-network-kmp-ppc64-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-ppc64-2_3.0.101_0.35-0.16.84 ocfs2-kmp-ppc64-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586): cluster-network-kmp-pae-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-pae-2_3.0.101_0.35-0.16.84 ocfs2-kmp-pae-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.35.1 kernel-default-base-3.0.101-0.35.1 kernel-default-devel-3.0.101-0.35.1 kernel-default-extra-3.0.101-0.35.1 kernel-source-3.0.101-0.35.1 kernel-syms-3.0.101-0.35.1 kernel-trace-devel-3.0.101-0.35.1 kernel-xen-3.0.101-0.35.1 kernel-xen-base-3.0.101-0.35.1 kernel-xen-devel-3.0.101-0.35.1 kernel-xen-extra-3.0.101-0.35.1 xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 - SUSE Linux Enterprise Desktop 11 SP3 (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.35.1 kernel-pae-base-3.0.101-0.35.1 kernel-pae-devel-3.0.101-0.35.1 kernel-pae-extra-3.0.101-0.35.1 xen-kmp-pae-4.2.4_02_3.0.101_0.35-0.7.45 - SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64): kernel-default-extra-3.0.101-0.35.1 - SLE 11 SERVER Unsupported Extras (i586 x86_64): kernel-xen-extra-3.0.101-0.35.1 - SLE 11 SERVER Unsupported Extras (ppc64): kernel-ppc64-extra-3.0.101-0.35.1 - SLE 11 SERVER Unsupported Extras (i586): kernel-pae-extra-3.0.101-0.35.1 References: http://support.novell.com/security/cve/CVE-2012-2372.html http://support.novell.com/security/cve/CVE-2013-2929.html http://support.novell.com/security/cve/CVE-2013-4299.html http://support.novell.com/security/cve/CVE-2013-4579.html http://support.novell.com/security/cve/CVE-2013-6382.html http://support.novell.com/security/cve/CVE-2013-7339.html http://support.novell.com/security/cve/CVE-2014-0055.html http://support.novell.com/security/cve/CVE-2014-0077.html http://support.novell.com/security/cve/CVE-2014-0101.html http://support.novell.com/security/cve/CVE-2014-0131.html http://support.novell.com/security/cve/CVE-2014-0155.html http://support.novell.com/security/cve/CVE-2014-1444.html http://support.novell.com/security/cve/CVE-2014-1445.html http://support.novell.com/security/cve/CVE-2014-1446.html http://support.novell.com/security/cve/CVE-2014-1874.html http://support.novell.com/security/cve/CVE-2014-2309.html http://support.novell.com/security/cve/CVE-2014-2523.html http://support.novell.com/security/cve/CVE-2014-2678.html http://support.novell.com/security/cve/CVE-2014-2851.html http://support.novell.com/security/cve/CVE-2014-3122.html http://support.novell.com/security/cve/CVE-2014-3144.html http://support.novell.com/security/cve/CVE-2014-3145.html http://support.novell.com/security/cve/CVE-2014-3917.html http://support.novell.com/security/cve/CVE-2014-4652.html http://support.novell.com/security/cve/CVE-2014-4653.html http://support.novell.com/security/cve/CVE-2014-4654.html http://support.novell.com/security/cve/CVE-2014-4655.html http://support.novell.com/security/cve/CVE-2014-4656.html http://support.novell.com/security/cve/CVE-2014-4699.html https://bugzilla.novell.com/767610 https://bugzilla.novell.com/786450 https://bugzilla.novell.com/792271 https://bugzilla.novell.com/821619 https://bugzilla.novell.com/832710 https://bugzilla.novell.com/837563 https://bugzilla.novell.com/840524 https://bugzilla.novell.com/846404 https://bugzilla.novell.com/846690 https://bugzilla.novell.com/847652 https://bugzilla.novell.com/850915 https://bugzilla.novell.com/851426 https://bugzilla.novell.com/851603 https://bugzilla.novell.com/852553 https://bugzilla.novell.com/855126 https://bugzilla.novell.com/857926 https://bugzilla.novell.com/858869 https://bugzilla.novell.com/858870 https://bugzilla.novell.com/858872 https://bugzilla.novell.com/859840 https://bugzilla.novell.com/861636 https://bugzilla.novell.com/861980 https://bugzilla.novell.com/862429 https://bugzilla.novell.com/862934 https://bugzilla.novell.com/863300 https://bugzilla.novell.com/863335 https://bugzilla.novell.com/863410 https://bugzilla.novell.com/863873 https://bugzilla.novell.com/864404 https://bugzilla.novell.com/864464 https://bugzilla.novell.com/865310 https://bugzilla.novell.com/865330 https://bugzilla.novell.com/865882 https://bugzilla.novell.com/866081 https://bugzilla.novell.com/866102 https://bugzilla.novell.com/866615 https://bugzilla.novell.com/866800 https://bugzilla.novell.com/866864 https://bugzilla.novell.com/867362 https://bugzilla.novell.com/867517 https://bugzilla.novell.com/867531 https://bugzilla.novell.com/867723 https://bugzilla.novell.com/867953 https://bugzilla.novell.com/868488 https://bugzilla.novell.com/868528 https://bugzilla.novell.com/868653 https://bugzilla.novell.com/868748 https://bugzilla.novell.com/869033 https://bugzilla.novell.com/869414 https://bugzilla.novell.com/869563 https://bugzilla.novell.com/869934 https://bugzilla.novell.com/870173 https://bugzilla.novell.com/870335 https://bugzilla.novell.com/870450 https://bugzilla.novell.com/870496 https://bugzilla.novell.com/870498 https://bugzilla.novell.com/870576 https://bugzilla.novell.com/870591 https://bugzilla.novell.com/870618 https://bugzilla.novell.com/870877 https://bugzilla.novell.com/870958 https://bugzilla.novell.com/871561 https://bugzilla.novell.com/871634 https://bugzilla.novell.com/871676 https://bugzilla.novell.com/871728 https://bugzilla.novell.com/871854 https://bugzilla.novell.com/871861 https://bugzilla.novell.com/871899 https://bugzilla.novell.com/872188 https://bugzilla.novell.com/872540 https://bugzilla.novell.com/872634 https://bugzilla.novell.com/873061 https://bugzilla.novell.com/873374 https://bugzilla.novell.com/873463 https://bugzilla.novell.com/874108 https://bugzilla.novell.com/874145 https://bugzilla.novell.com/874440 https://bugzilla.novell.com/874577 https://bugzilla.novell.com/875386 https://bugzilla.novell.com/876102 https://bugzilla.novell.com/876114 https://bugzilla.novell.com/876176 https://bugzilla.novell.com/876463 https://bugzilla.novell.com/877013 https://bugzilla.novell.com/877257 https://bugzilla.novell.com/877497 https://bugzilla.novell.com/877775 https://bugzilla.novell.com/878115 https://bugzilla.novell.com/878123 https://bugzilla.novell.com/878274 https://bugzilla.novell.com/878407 https://bugzilla.novell.com/878509 https://bugzilla.novell.com/879921 https://bugzilla.novell.com/879957 https://bugzilla.novell.com/880007 https://bugzilla.novell.com/880357 https://bugzilla.novell.com/880437 https://bugzilla.novell.com/880484 https://bugzilla.novell.com/881571 https://bugzilla.novell.com/881761 https://bugzilla.novell.com/881939 https://bugzilla.novell.com/882324 https://bugzilla.novell.com/883380 https://bugzilla.novell.com/883795 https://bugzilla.novell.com/885725 http://download.suse.com/patch/finder/?keywords=0d90047cc045e1a3930a1deab87758d9 http://download.suse.com/patch/finder/?keywords=13c414107953b996e47ad9beead577e5 http://download.suse.com/patch/finder/?keywords=1b23cbf839dfbac64393f47b25445072 http://download.suse.com/patch/finder/?keywords=1e1024c9ceb6dfbd02087a8e7fc30a41 http://download.suse.com/patch/finder/?keywords=1eb98ba9ebb1cc2e805aa760347c8f35 http://download.suse.com/patch/finder/?keywords=25116cdba8b0bd66ec544a70ecf69581 http://download.suse.com/patch/finder/?keywords=ac3c1f41b2fef1c20481c11cba3927fb http://download.suse.com/patch/finder/?keywords=c05c80da5f8738980eb4c3cf7b7eb43f http://download.suse.com/patch/finder/?keywords=fcdaebb0744ca50e161239dbb665f0d2 http://download.suse.com/patch/finder/?keywords=ff40c298b0b146e85c2548cf99724fd2 From sle-updates at lists.suse.com Wed Jul 16 21:47:40 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 17 Jul 2014 05:47:40 +0200 (CEST) Subject: SUSE-SU-2014:0911-1: important: Security update for Linux kernel Message-ID: <20140717034740.C4C4532161@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0911-1 Rating: important References: #767610 #786450 #792271 #821619 #832710 #837563 #840524 #846404 #846690 #847652 #850915 #851426 #851603 #852553 #855126 #857926 #858869 #858870 #858872 #859840 #861636 #861980 #862429 #862934 #863300 #863335 #863410 #863873 #864404 #864464 #865310 #865330 #865882 #866081 #866102 #866615 #866800 #866864 #867362 #867517 #867531 #867723 #867953 #868488 #868528 #868653 #868748 #869033 #869414 #869563 #869934 #870173 #870335 #870450 #870496 #870498 #870576 #870591 #870618 #870877 #870958 #871561 #871634 #871676 #871728 #871854 #871861 #871899 #872188 #872540 #872634 #873061 #873374 #873463 #874108 #874145 #874440 #874577 #875386 #876102 #876114 #876176 #876463 #877013 #877257 #877497 #877775 #878115 #878123 #878274 #878407 #878509 #879921 #879957 #880007 #880357 #880437 #880484 #881571 #881761 #881939 #882324 #883380 #883795 #885725 Cross-References: CVE-2012-2372 CVE-2013-2929 CVE-2013-4299 CVE-2013-4579 CVE-2013-6382 CVE-2013-7339 CVE-2014-0055 CVE-2014-0077 CVE-2014-0101 CVE-2014-0131 CVE-2014-0155 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2014-2309 CVE-2014-2523 CVE-2014-2678 CVE-2014-2851 CVE-2014-3122 CVE-2014-3144 CVE-2014-3145 CVE-2014-3917 CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2014-4699 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise High Availability Extension 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 SLE 11 SERVER Unsupported Extras ______________________________________________________________________________ An update that solves 29 vulnerabilities and has 76 fixes is now available. It includes one version update. Description: The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix various bugs and security issues. The following security bugs have been fixed: * CVE-2012-2372: The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interfaces own IP address, as demonstrated by rds-ping. (bnc#767610) * CVE-2013-2929: The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h. (bnc#847652) * CVE-2013-4299: Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device. (bnc#846404) * CVE-2013-4579: The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations. (bnc#851426) * CVE-2013-6382: Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c. (bnc#852553) * CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. (bnc#869563) * CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors. (bnc#870173) * CVE-2014-0077: drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. (bnc#870576) * CVE-2014-0101: The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk. (bnc#866102) * CVE-2014-0131: Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. (bnc#867723) * CVE-2014-0155: The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced. (bnc#872540) * CVE-2014-1444: The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call. (bnc#858869) * CVE-2014-1445: The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call. (bnc#858870) * CVE-2014-1446: The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call. (bnc#858872) * CVE-2014-1874: The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context. (bnc#863335) * CVE-2014-2309: The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets. (bnc#867531) * CVE-2014-2523: net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function. (bnc#868653) * CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. (bnc#871561) * CVE-2014-2851: Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter. (bnc#873374) * CVE-2014-3122: The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings. (bnc#876102) * CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced. (bnc#877257) * CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced. (bnc#877257) * CVE-2014-3917: kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number. (bnc#880484) * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number * (bnc#883724) * CVE-2014-4652: Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4653: sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call. (bnc#883795) * CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls. (bnc#883795) * CVE-2014-4656: Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function. (bnc#883795) * CVE-2014-4699: The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. (bnc#885725) Also the following non-security bugs have been fixed: * kernel: avoid page table walk on user space access (bnc#878407, LTC#110316). * spinlock: fix system hang with spin_retry <= 0 (bnc#874145, LTC#110189). * x86/UV: Set n_lshift based on GAM_GR_CONFIG MMR for UV3 (bnc#876176). * x86: Enable multiple CPUs in crash kernel (bnc#846690). * x86/mce: Fix CMCI preemption bugs (bnc#786450). * x86, CMCI: Add proper detection of end of CMCI storms (bnc#786450). * futex: revert back to the explicit waiter counting code (bnc#851603). * futex: avoid race between requeue and wake (bnc#851603). * intel-iommu: fix off-by-one in pagetable freeing (bnc#874577). * ia64: Change default PSR.ac from "1" to "0" (Fix erratum #237) (bnc#874108). * drivers/rtc/interface.c: fix infinite loop in initializing the alarm (bnc#871676). * drm/ast: Fix double lock at PM resume (bnc#883380). * drm/ast: add widescreen + rb modes from X.org driver (v2) (bnc#883380). * drm/ast: deal with bo reserve fail in dirty update path (bnc#883380). * drm/ast: do not attempt to acquire a reservation while in an interrupt handler (bnc#883380). * drm/ast: fix the ast open key function (bnc#883380). * drm/ast: fix value check in cbr_scan2 (bnc#883380). * drm/ast: inline reservations (bnc#883380). * drm/ast: invalidate page tables when pinning a BO (bnc#883380). * drm/ast: rename the mindwm/moutdwm and deinline them (bnc#883380). * drm/ast: resync the dram post code with upstream (bnc#883380). * drm: ast: use drm_can_sleep (bnc#883380). * drm/ast: use drm_modeset_lock_all (bnc#883380). * drm/: Unified handling of unimplemented fb->create_handle (bnc#883380). * drm/mgag200,ast,cirrus: fix regression with drm_can_sleep conversion (bnc#883380). * drm/mgag200: Consolidate depth/bpp handling (bnc#882324). * drm/ast: Initialized data needed to map fbdev memory (bnc#880007). * drm/ast: add AST 2400 support (bnc#880007). * drm/ast: Initialized data needed to map fbdev memory (bnc#880007). * drm/mgag200: on cards with < 2MB VRAM default to 16-bit (bnc#882324). * drm/mgag200: fix typo causing bw limits to be ignored on some chips (bnc#882324). * drm/ttm: do not oops if no invalidate_caches() (bnc#869414). * drm/i915: Break encoder->crtc link separately in intel_sanitize_crtc() (bnc#855126). * dlm: keep listening connection alive with sctp mode (bnc#881939) * series.conf: Clarify comment about Xen kabi adjustments (bnc#876114#c25) * btrfs: fix a crash when running balance and defrag concurrently. * btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). * btrfs: free delayed node outside of root->inode_lock (bnc#866864). * btrfs: return EPERM when deleting a default subvolume (bnc#869934). * btrfs: do not loop on large offsets in readdir (bnc#863300) * sched: Consider pi boosting in setscheduler. * sched: Queue RT tasks to head when prio drops. * sched: Adjust sched_reset_on_fork when nothing else changes. * sched: Fix clock_gettime(CLOCK__CPUTIME_ID) monotonicity (bnc#880357). * sched: Do not allow scheduler time to go backwards (bnc#880357). * sched: Make scale_rt_power() deal with backward clocks (bnc#865310). * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check (bnc#871861). * sched: update_rq_clock() must skip ONE update (bnc#869033, bnc#868528). * tcp: allow to disable cwnd moderation in TCP_CA_Loss state (bnc#879921). * tcp: clear xmit timers in tcp_v4_syn_recv_sock() (bnc#862429). * net: add missing bh_unlock_sock() calls (bnc#862429). * bonding: fix vlan_features computing (bnc#872634). * vlan: more careful checksum features handling (bnc#872634). * xfrm: fix race between netns cleanup and state expire notification (bnc#879957). * xfrm: check peer pointer for null before calling inet_putpeer() (bnc#877775). * ipv6: do not overwrite inetpeer metrics prematurely (bnc#867362). * pagecachelimit: reduce lru_lock contention for heavy parallel kabi fixup: (bnc#878509, bnc#864464). * pagecachelimit: reduce lru_lock contention for heavy parallel reclaim (bnc#878509, bnc#864464). * TTY: serial, cleanup include file (bnc#881571). * TTY: serial, fix includes in some drivers (bnc#881571). * serial_core: Fix race in uart_handle_dcd_change (bnc#881571). * powerpc/perf: Power8 PMU support (bnc#832710). * powerpc/perf: Add support for SIER (bnc#832710). * powerpc/perf: Add regs_no_sipr() (bnc#832710). * powerpc/perf: Add an accessor for regs->result (bnc#832710). * powerpc/perf: Convert mmcra_sipr/sihv() to regs_sipr/sihv() (bnc#832710). * powerpc/perf: Add an explict flag indicating presence of SLOT field (bnc#832710). * swiotlb: do not assume PA 0 is invalid (bnc#865882). * lockref: implement lockless reference count updates using cmpxchg() (FATE#317271). * af_iucv: wrong mapping of sent and confirmed skbs (bnc#878407, LTC#110452). * af_iucv: recvmsg problem for SOCK_STREAM sockets (bnc#878407, LTC#110452). * af_iucv: fix recvmsg by replacing skb_pull() function (bnc#878407, LTC#110452). * qla2xxx: Poll during initialization for ISP25xx and ISP83xx (bnc#837563). * qla2xxx: Fix request queue null dereference (bnc#859840). * lpfc 8.3.41: Fixed SLI3 failing FCP write on check-condition no-sense with residual zero (bnc#850915). * reiserfs: call truncate_setsize under tailpack mutex (bnc#878115). * reiserfs: drop vmtruncate (bnc#878115). * ipvs: handle IPv6 fragments with one-packet scheduling (bnc#861980). * kabi: hide modifications of struct sk_buff done by bnc#861980 fix (bnc#861980). * loop: remove the incorrect write_begin/write_end shortcut (bnc#878123). * watchdog: hpwdt patch to display informative string (bnc#862934). * watchdog: hpwdt: Patch to ignore auxilary iLO devices (bnc#862934). * watchdog: hpwdt: Add check for UEFI bits (bnc#862934). * watchdog: hpwdt.c: Increase version string (bnc#862934). * hpilo: Correct panic when an AUX iLO is detected (bnc#837563). * locking/mutexes: Introduce cancelable MCS lock for adaptive spinning (FATE#317271). * locking/mutexes: Modify the way optimistic spinners are queued (FATE#317271). * locking/mutexes: Return false if task need_resched() in mutex_can_spin_on_owner() (FATE#317271). * mutex: Enable the queuing of mutex spinners with MCS lock (FATE#317271). config: disabled on all flavors * mutex: Queue mutex spinners with MCS lock to reduce cacheline contention (FATE#317271). * memcg: deprecate memory.force_empty knob (bnc#878274). * kabi: protect struct net from bnc#877013 changes (bnc#877013). * netfilter: nfnetlink_queue: add net namespace support for nfnetlink_queue (bnc#877013). * netfilter: make /proc/net/netfilter pernet (bnc#877013). * netfilter: xt_hashlimit: fix proc entry leak in netns destroy path (bnc#871634). * netfilter: xt_hashlimit: fix namespace destroy path (bnc#871634). * netfilter: nf_queue: reject NF_STOLEN verdicts from userspace (bnc#870877). * netfilter: avoid double free in nf_reinject (bnc#870877). * netfilter: ctnetlink: fix race between delete and timeout expiration (bnc#863410). * netfilter: reuse skb->nfct_reasm for ipvs conn reference (bnc#861980). * mm: per-thread vma caching (FATE#317271). config: enable CONFIG_VMA_CACHE for x86_64/bigsmp * mm, hugetlb: improve page-fault scalability (FATE#317271). * mm: vmscan: Do not throttle based on pfmemalloc reserves if node has no ZONE_NORMAL (bnc#870496). * mm: fix off-by-one bug in print_nodes_state() (bnc#792271). * hugetlb: ensure hugepage access is denied if hugepages are not supported (PowerKVM crash when mounting hugetlbfs without hugepage support (bnc#870498)). * SELinux: Increase ebitmap_node size for 64-bit configuration (FATE#317271). * SELinux: Reduce overhead of mls_level_isvalid() function call (FATE#317271). * mutex: Fix debug_mutexes (FATE#317271). * mutex: Fix debug checks (FATE#317271). * locking/mutexes: Unlock the mutex without the wait_lock (FATE#317271). * epoll: do not take the nested ep->mtx on EPOLL_CTL_DEL (FATE#317271). * epoll: do not take global "epmutex" for simple topologies (FATE#317271). * epoll: optimize EPOLL_CTL_DEL using rcu (FATE#317271). * vfs: Fix missing unlock of vfsmount_lock in unlazy_walk (bnc#880437). * dcache: kABI fixes for lockref dentries (FATE#317271). * vfs: make sure we do not have a stale root path if unlazy_walk() fails (FATE#317271). * vfs: fix dentry RCU to refcounting possibly sleeping dput() (FATE#317271). * vfs: use lockref "dead" flag to mark unrecoverably dead dentries (FATE#317271). * vfs: reimplement d_rcu_to_refcount() using lockref_get_or_lock() (FATE#317271). * vfs: Remove second variable named error in __dentry_path (FATE#317271). * make prepend_name() work correctly when called with negative *buflen (FATE#317271). * prepend_path() needs to reinitialize dentry/vfsmount on restarts (FATE#317271). * dcache: get/release read lock in read_seqbegin_or_lock() & friend (FATE#317271). * seqlock: Add a new locking reader type (FATE#317271). * dcache: Translating dentry into pathname without taking rename_lock (FATE#317271). * vfs: make the dentry cache use the lockref infrastructure (FATE#317271). * vfs: Remove dentry->d_lock locking from shrink_dcache_for_umount_subtree() (FATE#317271). * vfs: use lockref_get_not_zero() for optimistic lockless dget_parent() (FATE#317271). * vfs: constify dentry parameter in d_count() (FATE#317271). * helper for reading ->d_count (FATE#317271). * lockref: use arch_mutex_cpu_relax() in CMPXCHG_LOOP() (FATE#317271). * lockref: allow relaxed cmpxchg64 variant for lockless updates (FATE#317271). * lockref: use cmpxchg64 explicitly for lockless updates (FATE#317271). * lockref: add ability to mark lockrefs "dead" (FATE#317271). * lockref: fix docbook argument names (FATE#317271). * lockref: Relax in cmpxchg loop (FATE#317271). * lockref: implement lockless reference count updates using cmpxchg() (FATE#317271). * lockref: uninline lockref helper functions (FATE#317271). * lockref: add lockref_get_or_lock() helper (FATE#317271). * Add new lockref infrastructure reference implementation (FATE#317271). * vfs: make lremovexattr retry once on ESTALE error (bnc#876463). * vfs: make removexattr retry once on ESTALE (bnc#876463). * vfs: make llistxattr retry once on ESTALE error (bnc#876463). * vfs: make listxattr retry once on ESTALE error (bnc#876463). * vfs: make lgetxattr retry once on ESTALE (bnc#876463). * vfs: make getxattr retry once on an ESTALE error (bnc#876463). * vfs: allow lsetxattr() to retry once on ESTALE errors (bnc#876463). * vfs: allow setxattr to retry once on ESTALE errors (bnc#876463). * vfs: allow utimensat() calls to retry once on an ESTALE error (bnc#876463). * vfs: fix user_statfs to retry once on ESTALE errors (bnc#876463). * vfs: make fchownat retry once on ESTALE errors (bnc#876463). * vfs: make fchmodat retry once on ESTALE errors (bnc#876463). * vfs: have chroot retry once on ESTALE error (bnc#876463). * vfs: have chdir retry lookup and call once on ESTALE error (bnc#876463). * vfs: have faccessat retry once on an ESTALE error (bnc#876463). * vfs: have do_sys_truncate retry once on an ESTALE error (bnc#876463). * vfs: fix renameat to retry on ESTALE errors (bnc#876463). * vfs: make do_unlinkat retry once on ESTALE errors (bnc#876463). * vfs: make do_rmdir retry once on ESTALE errors (bnc#876463). * vfs: fix linkat to retry once on ESTALE errors (bnc#876463). * vfs: fix symlinkat to retry on ESTALE errors (bnc#876463). * vfs: fix mkdirat to retry once on an ESTALE error (bnc#876463). * vfs: fix mknodat to retry on ESTALE errors (bnc#876463). * vfs: add a flags argument to user_path_parent (bnc#876463). * vfs: fix readlinkat to retry on ESTALE (bnc#876463). * vfs: make fstatat retry on ESTALE errors from getattr call (bnc#876463). * vfs: add a retry_estale helper function to handle retries on ESTALE (bnc#876463). * crypto: s390 - fix aes,des ctr mode concurrency finding (bnc#874145, LTC#110078). * s390/cio: fix unlocked access of global bitmap (bnc#874145, LTC#109378). * s390/css: stop stsch loop after cc 3 (bnc#874145, LTC#109378). * s390/pci: add kmsg man page (bnc#874145, LTC#109224). * s390/pci/dma: use correct segment boundary size (bnc#866081, LTC#104566). * cio: Fix missing subchannels after CHPID configure on (bnc#866081, LTC#104808). * cio: Fix process hangs during subchannel scan (bnc#866081, LTC#104805). * cio: fix unusable device (bnc#866081, LTC#104168). * qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873). * Fix race between starved list and device removal (bnc#861636). * namei.h: include errno.h (bnc#876463). * ALSA: hda - Implement bind mixer ctls for Conexant (bnc#872188). * ALSA: hda - Fix invalid Auto-Mute Mode enum from cxt codecs (bnc#872188). * ALSA: hda - Fix conflicting Capture Source on cxt codecs (bnc#872188). * ALSA: usb-audio: Fix NULL dereference while quick replugging (bnc#870335). * powerpc: Bring all threads online prior to migration/hibernation (bnc#870591). * powerpc/pseries: Update dynamic cache nodes for suspend/resume operation (bnc#873463). * powerpc/pseries: Device tree should only be updated once after suspend/migrate (bnc#873463). * powerpc/pseries: Expose in kernel device tree update to drmgr (bnc#873463). * powerpc: Add second POWER8 PVR entry (bnc#874440). * libata/ahci: accommodate tag ordered controllers (bnc#871728) * md: try to remove cause of a spinning md thread (bnc#875386). * md: fix up plugging (again) (bnc#866800). * NFSv4: Fix a reboot recovery race when opening a file (bnc#864404). * NFSv4: Ensure delegation recall and byte range lock removal do not conflict (bnc#864404). * NFSv4: Fix up the return values of nfs4_open_delegation_recall (bnc#864404). * NFSv4.1: Do not lose locks when a server reboots during delegation return (bnc#864404). * NFSv4.1: Prevent deadlocks between state recovery and file locking (bnc#864404). * NFSv4: Allow the state manager to mark an open_owner as being recovered (bnc#864404). * NFS: nfs_inode_return_delegation() should always flush dirty data (bnc#864404). * NFSv4: nfs_client_return_marked_delegations cannot flush data (bnc#864404). * NFS: avoid excessive GETATTR request when attributes expired but cached directory is valid (bnc#857926). * seqlock: add "raw_seqcount_begin()" function (bnc#864404). * Allow nfsdv4 to work when fips=1 (bnc#868488). * NFSv4: Add ACCESS operation to OPEN compound (bnc#870958). * NFSv4: Fix unnecessary delegation returns in nfs4_do_open (bnc#870958). * NFSv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873). * NFSv4: nfs4_proc_renew should be declared static (bnc#863873). * NFSv4: do not put ACCESS in OPEN compound if O_EXCL (bnc#870958). * NFS: revalidate on open if dcache is negative (bnc#876463). * NFSD add module parameter to disable delegations (bnc#876463). * Do not lose sockets when nfsd shutdown races with connection timeout (bnc#871854). * timer: Prevent overflow in apply_slack (bnc#873061). * mei: me: do not load the driver if the FW does not support MEI interface (bnc#821619). * ipmi: Reset the KCS timeout when starting error recovery (bnc#870618). * ipmi: Fix a race restarting the timer (bnc#870618). * ipmi: increase KCS timeouts (bnc#870618). * bnx2x: Fix kernel crash and data miscompare after EEH recovery (bnc#881761). * bnx2x: Adapter not recovery from EEH error injection (bnc#881761). * kabi: hide modifications of struct inet_peer done by bnc#867953 fix (bnc#867953). * inetpeer: prevent unlinking from unused list twice (bnc#867953). * Ignore selected taints for tracepoint modules (bnc#870450, FATE#317134). * Use "E" instead of "X" for unsigned module taint flag (bnc#870450,FATE#317134). * Fix: module signature vs tracepoints: add new TAINT_UNSIGNED_MODULE (bnc#870450,FATE#317134). * xhci: extend quirk for Renesas cards (bnc#877497). * scsi: return target failure on EMC inactive snapshot (bnc#840524). * virtio_balloon: do not softlockup on huge balloon changes (bnc#871899). * ch: add refcounting (bnc#867517). * storvsc: NULL pointer dereference fix (bnc#865330). * Unlock the rename_lock in dentry_path() in the case when path is too long (bnc#868748). Security Issue references: * CVE-2012-2372 * CVE-2013-2929 * CVE-2013-4299 * CVE-2013-4579 * CVE-2013-6382 * CVE-2013-7339 * CVE-2014-0055 * CVE-2014-0077 * CVE-2014-0101 * CVE-2014-0131 * CVE-2014-0155 * CVE-2014-1444 * CVE-2014-1445 * CVE-2014-1446 * CVE-2014-1874 * CVE-2014-2309 * CVE-2014-2523 * CVE-2014-2678 * CVE-2014-2851 * CVE-2014-3122 * CVE-2014-3144 * CVE-2014-3145 * CVE-2014-3917 * CVE-2014-4508 * CVE-2014-4652 * CVE-2014-4653 * CVE-2014-4654 * CVE-2014-4655 * CVE-2014-4656 * CVE-2014-4699 Indications: Everyone using the Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-kernel-9488 slessp3-kernel-9493 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-kernel-9488 slessp3-kernel-9489 slessp3-kernel-9490 slessp3-kernel-9491 slessp3-kernel-9493 - SUSE Linux Enterprise High Availability Extension 11 SP3: zypper in -t patch slehasp3-kernel-9488 slehasp3-kernel-9489 slehasp3-kernel-9490 slehasp3-kernel-9491 slehasp3-kernel-9493 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-kernel-9488 sledsp3-kernel-9493 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.35.1 kernel-default-base-3.0.101-0.35.1 kernel-default-devel-3.0.101-0.35.1 kernel-source-3.0.101-0.35.1 kernel-syms-3.0.101-0.35.1 kernel-trace-3.0.101-0.35.1 kernel-trace-base-3.0.101-0.35.1 kernel-trace-devel-3.0.101-0.35.1 kernel-xen-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.35.1 kernel-pae-base-3.0.101-0.35.1 kernel-pae-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.35.1 kernel-default-base-3.0.101-0.35.1 kernel-default-devel-3.0.101-0.35.1 kernel-source-3.0.101-0.35.1 kernel-syms-3.0.101-0.35.1 kernel-trace-3.0.101-0.35.1 kernel-trace-base-3.0.101-0.35.1 kernel-trace-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (i586 x86_64) [New Version: 3.0.101]: kernel-ec2-3.0.101-0.35.1 kernel-ec2-base-3.0.101-0.35.1 kernel-ec2-devel-3.0.101-0.35.1 kernel-xen-3.0.101-0.35.1 kernel-xen-base-3.0.101-0.35.1 kernel-xen-devel-3.0.101-0.35.1 xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 - SUSE Linux Enterprise Server 11 SP3 (s390x) [New Version: 3.0.101]: kernel-default-man-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (ppc64) [New Version: 3.0.101]: kernel-ppc64-3.0.101-0.35.1 kernel-ppc64-base-3.0.101-0.35.1 kernel-ppc64-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.35.1 kernel-pae-base-3.0.101-0.35.1 kernel-pae-devel-3.0.101-0.35.1 xen-kmp-pae-4.2.4_02_3.0.101_0.35-0.7.45 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64): cluster-network-kmp-default-1.4_3.0.101_0.35-2.27.78 cluster-network-kmp-trace-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-default-2_3.0.101_0.35-0.16.84 gfs2-kmp-trace-2_3.0.101_0.35-0.16.84 ocfs2-kmp-default-1.6_3.0.101_0.35-0.20.78 ocfs2-kmp-trace-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 x86_64): cluster-network-kmp-xen-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-xen-2_3.0.101_0.35-0.16.84 ocfs2-kmp-xen-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise High Availability Extension 11 SP3 (ppc64): cluster-network-kmp-ppc64-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-ppc64-2_3.0.101_0.35-0.16.84 ocfs2-kmp-ppc64-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586): cluster-network-kmp-pae-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-pae-2_3.0.101_0.35-0.16.84 ocfs2-kmp-pae-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.35.1 kernel-default-base-3.0.101-0.35.1 kernel-default-devel-3.0.101-0.35.1 kernel-default-extra-3.0.101-0.35.1 kernel-source-3.0.101-0.35.1 kernel-syms-3.0.101-0.35.1 kernel-trace-devel-3.0.101-0.35.1 kernel-xen-3.0.101-0.35.1 kernel-xen-base-3.0.101-0.35.1 kernel-xen-devel-3.0.101-0.35.1 kernel-xen-extra-3.0.101-0.35.1 xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 - SUSE Linux Enterprise Desktop 11 SP3 (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.35.1 kernel-pae-base-3.0.101-0.35.1 kernel-pae-devel-3.0.101-0.35.1 kernel-pae-extra-3.0.101-0.35.1 xen-kmp-pae-4.2.4_02_3.0.101_0.35-0.7.45 - SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64): kernel-default-extra-3.0.101-0.35.1 - SLE 11 SERVER Unsupported Extras (i586 x86_64): kernel-xen-extra-3.0.101-0.35.1 - SLE 11 SERVER Unsupported Extras (ppc64): kernel-ppc64-extra-3.0.101-0.35.1 - SLE 11 SERVER Unsupported Extras (i586): kernel-pae-extra-3.0.101-0.35.1 References: http://support.novell.com/security/cve/CVE-2012-2372.html http://support.novell.com/security/cve/CVE-2013-2929.html http://support.novell.com/security/cve/CVE-2013-4299.html http://support.novell.com/security/cve/CVE-2013-4579.html http://support.novell.com/security/cve/CVE-2013-6382.html http://support.novell.com/security/cve/CVE-2013-7339.html http://support.novell.com/security/cve/CVE-2014-0055.html http://support.novell.com/security/cve/CVE-2014-0077.html http://support.novell.com/security/cve/CVE-2014-0101.html http://support.novell.com/security/cve/CVE-2014-0131.html http://support.novell.com/security/cve/CVE-2014-0155.html http://support.novell.com/security/cve/CVE-2014-1444.html http://support.novell.com/security/cve/CVE-2014-1445.html http://support.novell.com/security/cve/CVE-2014-1446.html http://support.novell.com/security/cve/CVE-2014-1874.html http://support.novell.com/security/cve/CVE-2014-2309.html http://support.novell.com/security/cve/CVE-2014-2523.html http://support.novell.com/security/cve/CVE-2014-2678.html http://support.novell.com/security/cve/CVE-2014-2851.html http://support.novell.com/security/cve/CVE-2014-3122.html http://support.novell.com/security/cve/CVE-2014-3144.html http://support.novell.com/security/cve/CVE-2014-3145.html http://support.novell.com/security/cve/CVE-2014-3917.html http://support.novell.com/security/cve/CVE-2014-4652.html http://support.novell.com/security/cve/CVE-2014-4653.html http://support.novell.com/security/cve/CVE-2014-4654.html http://support.novell.com/security/cve/CVE-2014-4655.html http://support.novell.com/security/cve/CVE-2014-4656.html http://support.novell.com/security/cve/CVE-2014-4699.html https://bugzilla.novell.com/767610 https://bugzilla.novell.com/786450 https://bugzilla.novell.com/792271 https://bugzilla.novell.com/821619 https://bugzilla.novell.com/832710 https://bugzilla.novell.com/837563 https://bugzilla.novell.com/840524 https://bugzilla.novell.com/846404 https://bugzilla.novell.com/846690 https://bugzilla.novell.com/847652 https://bugzilla.novell.com/850915 https://bugzilla.novell.com/851426 https://bugzilla.novell.com/851603 https://bugzilla.novell.com/852553 https://bugzilla.novell.com/855126 https://bugzilla.novell.com/857926 https://bugzilla.novell.com/858869 https://bugzilla.novell.com/858870 https://bugzilla.novell.com/858872 https://bugzilla.novell.com/859840 https://bugzilla.novell.com/861636 https://bugzilla.novell.com/861980 https://bugzilla.novell.com/862429 https://bugzilla.novell.com/862934 https://bugzilla.novell.com/863300 https://bugzilla.novell.com/863335 https://bugzilla.novell.com/863410 https://bugzilla.novell.com/863873 https://bugzilla.novell.com/864404 https://bugzilla.novell.com/864464 https://bugzilla.novell.com/865310 https://bugzilla.novell.com/865330 https://bugzilla.novell.com/865882 https://bugzilla.novell.com/866081 https://bugzilla.novell.com/866102 https://bugzilla.novell.com/866615 https://bugzilla.novell.com/866800 https://bugzilla.novell.com/866864 https://bugzilla.novell.com/867362 https://bugzilla.novell.com/867517 https://bugzilla.novell.com/867531 https://bugzilla.novell.com/867723 https://bugzilla.novell.com/867953 https://bugzilla.novell.com/868488 https://bugzilla.novell.com/868528 https://bugzilla.novell.com/868653 https://bugzilla.novell.com/868748 https://bugzilla.novell.com/869033 https://bugzilla.novell.com/869414 https://bugzilla.novell.com/869563 https://bugzilla.novell.com/869934 https://bugzilla.novell.com/870173 https://bugzilla.novell.com/870335 https://bugzilla.novell.com/870450 https://bugzilla.novell.com/870496 https://bugzilla.novell.com/870498 https://bugzilla.novell.com/870576 https://bugzilla.novell.com/870591 https://bugzilla.novell.com/870618 https://bugzilla.novell.com/870877 https://bugzilla.novell.com/870958 https://bugzilla.novell.com/871561 https://bugzilla.novell.com/871634 https://bugzilla.novell.com/871676 https://bugzilla.novell.com/871728 https://bugzilla.novell.com/871854 https://bugzilla.novell.com/871861 https://bugzilla.novell.com/871899 https://bugzilla.novell.com/872188 https://bugzilla.novell.com/872540 https://bugzilla.novell.com/872634 https://bugzilla.novell.com/873061 https://bugzilla.novell.com/873374 https://bugzilla.novell.com/873463 https://bugzilla.novell.com/874108 https://bugzilla.novell.com/874145 https://bugzilla.novell.com/874440 https://bugzilla.novell.com/874577 https://bugzilla.novell.com/875386 https://bugzilla.novell.com/876102 https://bugzilla.novell.com/876114 https://bugzilla.novell.com/876176 https://bugzilla.novell.com/876463 https://bugzilla.novell.com/877013 https://bugzilla.novell.com/877257 https://bugzilla.novell.com/877497 https://bugzilla.novell.com/877775 https://bugzilla.novell.com/878115 https://bugzilla.novell.com/878123 https://bugzilla.novell.com/878274 https://bugzilla.novell.com/878407 https://bugzilla.novell.com/878509 https://bugzilla.novell.com/879921 https://bugzilla.novell.com/879957 https://bugzilla.novell.com/880007 https://bugzilla.novell.com/880357 https://bugzilla.novell.com/880437 https://bugzilla.novell.com/880484 https://bugzilla.novell.com/881571 https://bugzilla.novell.com/881761 https://bugzilla.novell.com/881939 https://bugzilla.novell.com/882324 https://bugzilla.novell.com/883380 https://bugzilla.novell.com/883795 https://bugzilla.novell.com/885725 http://download.suse.com/patch/finder/?keywords=0d90047cc045e1a3930a1deab87758d9 http://download.suse.com/patch/finder/?keywords=13c414107953b996e47ad9beead577e5 http://download.suse.com/patch/finder/?keywords=1b23cbf839dfbac64393f47b25445072 http://download.suse.com/patch/finder/?keywords=1e1024c9ceb6dfbd02087a8e7fc30a41 http://download.suse.com/patch/finder/?keywords=1eb98ba9ebb1cc2e805aa760347c8f35 http://download.suse.com/patch/finder/?keywords=25116cdba8b0bd66ec544a70ecf69581 http://download.suse.com/patch/finder/?keywords=ac3c1f41b2fef1c20481c11cba3927fb http://download.suse.com/patch/finder/?keywords=c05c80da5f8738980eb4c3cf7b7eb43f http://download.suse.com/patch/finder/?keywords=fcdaebb0744ca50e161239dbb665f0d2 http://download.suse.com/patch/finder/?keywords=ff40c298b0b146e85c2548cf99724fd2 From sle-updates at lists.suse.com Wed Jul 16 22:33:28 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 17 Jul 2014 06:33:28 +0200 (CEST) Subject: SUSE-SU-2014:0912-1: important: Security update for Linux kernel Message-ID: <20140717043328.ECDE732161@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0912-1 Rating: important References: #767610 #786450 #792271 #821619 #832710 #837563 #840524 #846404 #846690 #847652 #850915 #851426 #851603 #852553 #855126 #857926 #858869 #858870 #858872 #859840 #861636 #861980 #862429 #862934 #863300 #863335 #863410 #863873 #864404 #864464 #865310 #865330 #865882 #866081 #866102 #866615 #866800 #866864 #867362 #867517 #867531 #867723 #867953 #868488 #868528 #868653 #868748 #869033 #869414 #869563 #869934 #870173 #870335 #870450 #870496 #870498 #870576 #870591 #870618 #870877 #870958 #871561 #871634 #871676 #871728 #871854 #871861 #871899 #872188 #872540 #872634 #873061 #873374 #873463 #874108 #874145 #874440 #874577 #875386 #876102 #876114 #876176 #876463 #877013 #877257 #877497 #877775 #878115 #878123 #878274 #878407 #878509 #879921 #879957 #880007 #880357 #880437 #880484 #881571 #881761 #881939 #882324 #883380 #883795 #885725 Cross-References: CVE-2012-2372 CVE-2013-2929 CVE-2013-4299 CVE-2013-4579 CVE-2013-6382 CVE-2013-7339 CVE-2014-0055 CVE-2014-0077 CVE-2014-0101 CVE-2014-0131 CVE-2014-0155 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2014-2309 CVE-2014-2523 CVE-2014-2678 CVE-2014-2851 CVE-2014-3122 CVE-2014-3144 CVE-2014-3145 CVE-2014-3917 CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2014-4699 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise High Availability Extension 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 SLE 11 SERVER Unsupported Extras ______________________________________________________________________________ An update that solves 29 vulnerabilities and has 76 fixes is now available. It includes one version update. Description: The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix various bugs and security issues. The following security bugs have been fixed: * CVE-2012-2372: The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interfaces own IP address, as demonstrated by rds-ping. (bnc#767610) * CVE-2013-2929: The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h. (bnc#847652) * CVE-2013-4299: Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device. (bnc#846404) * CVE-2013-4579: The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations. (bnc#851426) * CVE-2013-6382: Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c. (bnc#852553) * CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. (bnc#869563) * CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors. (bnc#870173) * CVE-2014-0077: drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions. (bnc#870576) * CVE-2014-0101: The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk. (bnc#866102) * CVE-2014-0131: Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. (bnc#867723) * CVE-2014-0155: The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced. (bnc#872540) * CVE-2014-1444: The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call. (bnc#858869) * CVE-2014-1445: The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call. (bnc#858870) * CVE-2014-1446: The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call. (bnc#858872) * CVE-2014-1874: The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context. (bnc#863335) * CVE-2014-2309: The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets. (bnc#867531) * CVE-2014-2523: net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function. (bnc#868653) * CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports. (bnc#871561) * CVE-2014-2851: Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter. (bnc#873374) * CVE-2014-3122: The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings. (bnc#876102) * CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced. (bnc#877257) * CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced. (bnc#877257) * CVE-2014-3917: kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number. (bnc#880484) * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number * (bnc#883724) * CVE-2014-4652: Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4653: sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. (bnc#883795) * CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call. (bnc#883795) * CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls. (bnc#883795) * CVE-2014-4656: Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function. (bnc#883795) * CVE-2014-4699: The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls. (bnc#885725) Also the following non-security bugs have been fixed: * kernel: avoid page table walk on user space access (bnc#878407, LTC#110316). * spinlock: fix system hang with spin_retry <= 0 (bnc#874145, LTC#110189). * x86/UV: Set n_lshift based on GAM_GR_CONFIG MMR for UV3 (bnc#876176). * x86: Enable multiple CPUs in crash kernel (bnc#846690). * x86/mce: Fix CMCI preemption bugs (bnc#786450). * x86, CMCI: Add proper detection of end of CMCI storms (bnc#786450). * futex: revert back to the explicit waiter counting code (bnc#851603). * futex: avoid race between requeue and wake (bnc#851603). * intel-iommu: fix off-by-one in pagetable freeing (bnc#874577). * ia64: Change default PSR.ac from "1" to "0" (Fix erratum #237) (bnc#874108). * drivers/rtc/interface.c: fix infinite loop in initializing the alarm (bnc#871676). * drm/ast: Fix double lock at PM resume (bnc#883380). * drm/ast: add widescreen + rb modes from X.org driver (v2) (bnc#883380). * drm/ast: deal with bo reserve fail in dirty update path (bnc#883380). * drm/ast: do not attempt to acquire a reservation while in an interrupt handler (bnc#883380). * drm/ast: fix the ast open key function (bnc#883380). * drm/ast: fix value check in cbr_scan2 (bnc#883380). * drm/ast: inline reservations (bnc#883380). * drm/ast: invalidate page tables when pinning a BO (bnc#883380). * drm/ast: rename the mindwm/moutdwm and deinline them (bnc#883380). * drm/ast: resync the dram post code with upstream (bnc#883380). * drm: ast: use drm_can_sleep (bnc#883380). * drm/ast: use drm_modeset_lock_all (bnc#883380). * drm/: Unified handling of unimplemented fb->create_handle (bnc#883380). * drm/mgag200,ast,cirrus: fix regression with drm_can_sleep conversion (bnc#883380). * drm/mgag200: Consolidate depth/bpp handling (bnc#882324). * drm/ast: Initialized data needed to map fbdev memory (bnc#880007). * drm/ast: add AST 2400 support (bnc#880007). * drm/ast: Initialized data needed to map fbdev memory (bnc#880007). * drm/mgag200: on cards with < 2MB VRAM default to 16-bit (bnc#882324). * drm/mgag200: fix typo causing bw limits to be ignored on some chips (bnc#882324). * drm/ttm: do not oops if no invalidate_caches() (bnc#869414). * drm/i915: Break encoder->crtc link separately in intel_sanitize_crtc() (bnc#855126). * dlm: keep listening connection alive with sctp mode (bnc#881939) * series.conf: Clarify comment about Xen kabi adjustments (bnc#876114#c25) * btrfs: fix a crash when running balance and defrag concurrently. * btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). * btrfs: free delayed node outside of root->inode_lock (bnc#866864). * btrfs: return EPERM when deleting a default subvolume (bnc#869934). * btrfs: do not loop on large offsets in readdir (bnc#863300) * sched: Consider pi boosting in setscheduler. * sched: Queue RT tasks to head when prio drops. * sched: Adjust sched_reset_on_fork when nothing else changes. * sched: Fix clock_gettime(CLOCK__CPUTIME_ID) monotonicity (bnc#880357). * sched: Do not allow scheduler time to go backwards (bnc#880357). * sched: Make scale_rt_power() deal with backward clocks (bnc#865310). * sched: Use CPUPRI_NR_PRIORITIES instead of MAX_RT_PRIO in cpupri check (bnc#871861). * sched: update_rq_clock() must skip ONE update (bnc#869033, bnc#868528). * tcp: allow to disable cwnd moderation in TCP_CA_Loss state (bnc#879921). * tcp: clear xmit timers in tcp_v4_syn_recv_sock() (bnc#862429). * net: add missing bh_unlock_sock() calls (bnc#862429). * bonding: fix vlan_features computing (bnc#872634). * vlan: more careful checksum features handling (bnc#872634). * xfrm: fix race between netns cleanup and state expire notification (bnc#879957). * xfrm: check peer pointer for null before calling inet_putpeer() (bnc#877775). * ipv6: do not overwrite inetpeer metrics prematurely (bnc#867362). * pagecachelimit: reduce lru_lock contention for heavy parallel kabi fixup: (bnc#878509, bnc#864464). * pagecachelimit: reduce lru_lock contention for heavy parallel reclaim (bnc#878509, bnc#864464). * TTY: serial, cleanup include file (bnc#881571). * TTY: serial, fix includes in some drivers (bnc#881571). * serial_core: Fix race in uart_handle_dcd_change (bnc#881571). * powerpc/perf: Power8 PMU support (bnc#832710). * powerpc/perf: Add support for SIER (bnc#832710). * powerpc/perf: Add regs_no_sipr() (bnc#832710). * powerpc/perf: Add an accessor for regs->result (bnc#832710). * powerpc/perf: Convert mmcra_sipr/sihv() to regs_sipr/sihv() (bnc#832710). * powerpc/perf: Add an explict flag indicating presence of SLOT field (bnc#832710). * swiotlb: do not assume PA 0 is invalid (bnc#865882). * lockref: implement lockless reference count updates using cmpxchg() (FATE#317271). * af_iucv: wrong mapping of sent and confirmed skbs (bnc#878407, LTC#110452). * af_iucv: recvmsg problem for SOCK_STREAM sockets (bnc#878407, LTC#110452). * af_iucv: fix recvmsg by replacing skb_pull() function (bnc#878407, LTC#110452). * qla2xxx: Poll during initialization for ISP25xx and ISP83xx (bnc#837563). * qla2xxx: Fix request queue null dereference (bnc#859840). * lpfc 8.3.41: Fixed SLI3 failing FCP write on check-condition no-sense with residual zero (bnc#850915). * reiserfs: call truncate_setsize under tailpack mutex (bnc#878115). * reiserfs: drop vmtruncate (bnc#878115). * ipvs: handle IPv6 fragments with one-packet scheduling (bnc#861980). * kabi: hide modifications of struct sk_buff done by bnc#861980 fix (bnc#861980). * loop: remove the incorrect write_begin/write_end shortcut (bnc#878123). * watchdog: hpwdt patch to display informative string (bnc#862934). * watchdog: hpwdt: Patch to ignore auxilary iLO devices (bnc#862934). * watchdog: hpwdt: Add check for UEFI bits (bnc#862934). * watchdog: hpwdt.c: Increase version string (bnc#862934). * hpilo: Correct panic when an AUX iLO is detected (bnc#837563). * locking/mutexes: Introduce cancelable MCS lock for adaptive spinning (FATE#317271). * locking/mutexes: Modify the way optimistic spinners are queued (FATE#317271). * locking/mutexes: Return false if task need_resched() in mutex_can_spin_on_owner() (FATE#317271). * mutex: Enable the queuing of mutex spinners with MCS lock (FATE#317271). config: disabled on all flavors * mutex: Queue mutex spinners with MCS lock to reduce cacheline contention (FATE#317271). * memcg: deprecate memory.force_empty knob (bnc#878274). * kabi: protect struct net from bnc#877013 changes (bnc#877013). * netfilter: nfnetlink_queue: add net namespace support for nfnetlink_queue (bnc#877013). * netfilter: make /proc/net/netfilter pernet (bnc#877013). * netfilter: xt_hashlimit: fix proc entry leak in netns destroy path (bnc#871634). * netfilter: xt_hashlimit: fix namespace destroy path (bnc#871634). * netfilter: nf_queue: reject NF_STOLEN verdicts from userspace (bnc#870877). * netfilter: avoid double free in nf_reinject (bnc#870877). * netfilter: ctnetlink: fix race between delete and timeout expiration (bnc#863410). * netfilter: reuse skb->nfct_reasm for ipvs conn reference (bnc#861980). * mm: per-thread vma caching (FATE#317271). config: enable CONFIG_VMA_CACHE for x86_64/bigsmp * mm, hugetlb: improve page-fault scalability (FATE#317271). * mm: vmscan: Do not throttle based on pfmemalloc reserves if node has no ZONE_NORMAL (bnc#870496). * mm: fix off-by-one bug in print_nodes_state() (bnc#792271). * hugetlb: ensure hugepage access is denied if hugepages are not supported (PowerKVM crash when mounting hugetlbfs without hugepage support (bnc#870498)). * SELinux: Increase ebitmap_node size for 64-bit configuration (FATE#317271). * SELinux: Reduce overhead of mls_level_isvalid() function call (FATE#317271). * mutex: Fix debug_mutexes (FATE#317271). * mutex: Fix debug checks (FATE#317271). * locking/mutexes: Unlock the mutex without the wait_lock (FATE#317271). * epoll: do not take the nested ep->mtx on EPOLL_CTL_DEL (FATE#317271). * epoll: do not take global "epmutex" for simple topologies (FATE#317271). * epoll: optimize EPOLL_CTL_DEL using rcu (FATE#317271). * vfs: Fix missing unlock of vfsmount_lock in unlazy_walk (bnc#880437). * dcache: kABI fixes for lockref dentries (FATE#317271). * vfs: make sure we do not have a stale root path if unlazy_walk() fails (FATE#317271). * vfs: fix dentry RCU to refcounting possibly sleeping dput() (FATE#317271). * vfs: use lockref "dead" flag to mark unrecoverably dead dentries (FATE#317271). * vfs: reimplement d_rcu_to_refcount() using lockref_get_or_lock() (FATE#317271). * vfs: Remove second variable named error in __dentry_path (FATE#317271). * make prepend_name() work correctly when called with negative *buflen (FATE#317271). * prepend_path() needs to reinitialize dentry/vfsmount on restarts (FATE#317271). * dcache: get/release read lock in read_seqbegin_or_lock() & friend (FATE#317271). * seqlock: Add a new locking reader type (FATE#317271). * dcache: Translating dentry into pathname without taking rename_lock (FATE#317271). * vfs: make the dentry cache use the lockref infrastructure (FATE#317271). * vfs: Remove dentry->d_lock locking from shrink_dcache_for_umount_subtree() (FATE#317271). * vfs: use lockref_get_not_zero() for optimistic lockless dget_parent() (FATE#317271). * vfs: constify dentry parameter in d_count() (FATE#317271). * helper for reading ->d_count (FATE#317271). * lockref: use arch_mutex_cpu_relax() in CMPXCHG_LOOP() (FATE#317271). * lockref: allow relaxed cmpxchg64 variant for lockless updates (FATE#317271). * lockref: use cmpxchg64 explicitly for lockless updates (FATE#317271). * lockref: add ability to mark lockrefs "dead" (FATE#317271). * lockref: fix docbook argument names (FATE#317271). * lockref: Relax in cmpxchg loop (FATE#317271). * lockref: implement lockless reference count updates using cmpxchg() (FATE#317271). * lockref: uninline lockref helper functions (FATE#317271). * lockref: add lockref_get_or_lock() helper (FATE#317271). * Add new lockref infrastructure reference implementation (FATE#317271). * vfs: make lremovexattr retry once on ESTALE error (bnc#876463). * vfs: make removexattr retry once on ESTALE (bnc#876463). * vfs: make llistxattr retry once on ESTALE error (bnc#876463). * vfs: make listxattr retry once on ESTALE error (bnc#876463). * vfs: make lgetxattr retry once on ESTALE (bnc#876463). * vfs: make getxattr retry once on an ESTALE error (bnc#876463). * vfs: allow lsetxattr() to retry once on ESTALE errors (bnc#876463). * vfs: allow setxattr to retry once on ESTALE errors (bnc#876463). * vfs: allow utimensat() calls to retry once on an ESTALE error (bnc#876463). * vfs: fix user_statfs to retry once on ESTALE errors (bnc#876463). * vfs: make fchownat retry once on ESTALE errors (bnc#876463). * vfs: make fchmodat retry once on ESTALE errors (bnc#876463). * vfs: have chroot retry once on ESTALE error (bnc#876463). * vfs: have chdir retry lookup and call once on ESTALE error (bnc#876463). * vfs: have faccessat retry once on an ESTALE error (bnc#876463). * vfs: have do_sys_truncate retry once on an ESTALE error (bnc#876463). * vfs: fix renameat to retry on ESTALE errors (bnc#876463). * vfs: make do_unlinkat retry once on ESTALE errors (bnc#876463). * vfs: make do_rmdir retry once on ESTALE errors (bnc#876463). * vfs: fix linkat to retry once on ESTALE errors (bnc#876463). * vfs: fix symlinkat to retry on ESTALE errors (bnc#876463). * vfs: fix mkdirat to retry once on an ESTALE error (bnc#876463). * vfs: fix mknodat to retry on ESTALE errors (bnc#876463). * vfs: add a flags argument to user_path_parent (bnc#876463). * vfs: fix readlinkat to retry on ESTALE (bnc#876463). * vfs: make fstatat retry on ESTALE errors from getattr call (bnc#876463). * vfs: add a retry_estale helper function to handle retries on ESTALE (bnc#876463). * crypto: s390 - fix aes,des ctr mode concurrency finding (bnc#874145, LTC#110078). * s390/cio: fix unlocked access of global bitmap (bnc#874145, LTC#109378). * s390/css: stop stsch loop after cc 3 (bnc#874145, LTC#109378). * s390/pci: add kmsg man page (bnc#874145, LTC#109224). * s390/pci/dma: use correct segment boundary size (bnc#866081, LTC#104566). * cio: Fix missing subchannels after CHPID configure on (bnc#866081, LTC#104808). * cio: Fix process hangs during subchannel scan (bnc#866081, LTC#104805). * cio: fix unusable device (bnc#866081, LTC#104168). * qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873). * Fix race between starved list and device removal (bnc#861636). * namei.h: include errno.h (bnc#876463). * ALSA: hda - Implement bind mixer ctls for Conexant (bnc#872188). * ALSA: hda - Fix invalid Auto-Mute Mode enum from cxt codecs (bnc#872188). * ALSA: hda - Fix conflicting Capture Source on cxt codecs (bnc#872188). * ALSA: usb-audio: Fix NULL dereference while quick replugging (bnc#870335). * powerpc: Bring all threads online prior to migration/hibernation (bnc#870591). * powerpc/pseries: Update dynamic cache nodes for suspend/resume operation (bnc#873463). * powerpc/pseries: Device tree should only be updated once after suspend/migrate (bnc#873463). * powerpc/pseries: Expose in kernel device tree update to drmgr (bnc#873463). * powerpc: Add second POWER8 PVR entry (bnc#874440). * libata/ahci: accommodate tag ordered controllers (bnc#871728) * md: try to remove cause of a spinning md thread (bnc#875386). * md: fix up plugging (again) (bnc#866800). * NFSv4: Fix a reboot recovery race when opening a file (bnc#864404). * NFSv4: Ensure delegation recall and byte range lock removal do not conflict (bnc#864404). * NFSv4: Fix up the return values of nfs4_open_delegation_recall (bnc#864404). * NFSv4.1: Do not lose locks when a server reboots during delegation return (bnc#864404). * NFSv4.1: Prevent deadlocks between state recovery and file locking (bnc#864404). * NFSv4: Allow the state manager to mark an open_owner as being recovered (bnc#864404). * NFS: nfs_inode_return_delegation() should always flush dirty data (bnc#864404). * NFSv4: nfs_client_return_marked_delegations cannot flush data (bnc#864404). * NFS: avoid excessive GETATTR request when attributes expired but cached directory is valid (bnc#857926). * seqlock: add "raw_seqcount_begin()" function (bnc#864404). * Allow nfsdv4 to work when fips=1 (bnc#868488). * NFSv4: Add ACCESS operation to OPEN compound (bnc#870958). * NFSv4: Fix unnecessary delegation returns in nfs4_do_open (bnc#870958). * NFSv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873). * NFSv4: nfs4_proc_renew should be declared static (bnc#863873). * NFSv4: do not put ACCESS in OPEN compound if O_EXCL (bnc#870958). * NFS: revalidate on open if dcache is negative (bnc#876463). * NFSD add module parameter to disable delegations (bnc#876463). * Do not lose sockets when nfsd shutdown races with connection timeout (bnc#871854). * timer: Prevent overflow in apply_slack (bnc#873061). * mei: me: do not load the driver if the FW does not support MEI interface (bnc#821619). * ipmi: Reset the KCS timeout when starting error recovery (bnc#870618). * ipmi: Fix a race restarting the timer (bnc#870618). * ipmi: increase KCS timeouts (bnc#870618). * bnx2x: Fix kernel crash and data miscompare after EEH recovery (bnc#881761). * bnx2x: Adapter not recovery from EEH error injection (bnc#881761). * kabi: hide modifications of struct inet_peer done by bnc#867953 fix (bnc#867953). * inetpeer: prevent unlinking from unused list twice (bnc#867953). * Ignore selected taints for tracepoint modules (bnc#870450, FATE#317134). * Use "E" instead of "X" for unsigned module taint flag (bnc#870450,FATE#317134). * Fix: module signature vs tracepoints: add new TAINT_UNSIGNED_MODULE (bnc#870450,FATE#317134). * xhci: extend quirk for Renesas cards (bnc#877497). * scsi: return target failure on EMC inactive snapshot (bnc#840524). * virtio_balloon: do not softlockup on huge balloon changes (bnc#871899). * ch: add refcounting (bnc#867517). * storvsc: NULL pointer dereference fix (bnc#865330). * Unlock the rename_lock in dentry_path() in the case when path is too long (bnc#868748). Security Issue references: * CVE-2012-2372 * CVE-2013-2929 * CVE-2013-4299 * CVE-2013-4579 * CVE-2013-6382 * CVE-2013-7339 * CVE-2014-0055 * CVE-2014-0077 * CVE-2014-0101 * CVE-2014-0131 * CVE-2014-0155 * CVE-2014-1444 * CVE-2014-1445 * CVE-2014-1446 * CVE-2014-1874 * CVE-2014-2309 * CVE-2014-2523 * CVE-2014-2678 * CVE-2014-2851 * CVE-2014-3122 * CVE-2014-3144 * CVE-2014-3145 * CVE-2014-3917 * CVE-2014-4508 * CVE-2014-4652 * CVE-2014-4653 * CVE-2014-4654 * CVE-2014-4655 * CVE-2014-4656 * CVE-2014-4699 Indications: Everyone using the Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-kernel-9488 slessp3-kernel-9493 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-kernel-9488 slessp3-kernel-9489 slessp3-kernel-9490 slessp3-kernel-9491 slessp3-kernel-9493 - SUSE Linux Enterprise High Availability Extension 11 SP3: zypper in -t patch slehasp3-kernel-9488 slehasp3-kernel-9489 slehasp3-kernel-9490 slehasp3-kernel-9491 slehasp3-kernel-9493 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-kernel-9488 sledsp3-kernel-9493 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.35.1 kernel-default-base-3.0.101-0.35.1 kernel-default-devel-3.0.101-0.35.1 kernel-source-3.0.101-0.35.1 kernel-syms-3.0.101-0.35.1 kernel-trace-3.0.101-0.35.1 kernel-trace-base-3.0.101-0.35.1 kernel-trace-devel-3.0.101-0.35.1 kernel-xen-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.35.1 kernel-pae-base-3.0.101-0.35.1 kernel-pae-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.35.1 kernel-default-base-3.0.101-0.35.1 kernel-default-devel-3.0.101-0.35.1 kernel-source-3.0.101-0.35.1 kernel-syms-3.0.101-0.35.1 kernel-trace-3.0.101-0.35.1 kernel-trace-base-3.0.101-0.35.1 kernel-trace-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (i586 x86_64) [New Version: 3.0.101]: kernel-ec2-3.0.101-0.35.1 kernel-ec2-base-3.0.101-0.35.1 kernel-ec2-devel-3.0.101-0.35.1 kernel-xen-3.0.101-0.35.1 kernel-xen-base-3.0.101-0.35.1 kernel-xen-devel-3.0.101-0.35.1 xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 - SUSE Linux Enterprise Server 11 SP3 (s390x) [New Version: 3.0.101]: kernel-default-man-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (ppc64) [New Version: 3.0.101]: kernel-ppc64-3.0.101-0.35.1 kernel-ppc64-base-3.0.101-0.35.1 kernel-ppc64-devel-3.0.101-0.35.1 - SUSE Linux Enterprise Server 11 SP3 (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.35.1 kernel-pae-base-3.0.101-0.35.1 kernel-pae-devel-3.0.101-0.35.1 xen-kmp-pae-4.2.4_02_3.0.101_0.35-0.7.45 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64): cluster-network-kmp-default-1.4_3.0.101_0.35-2.27.78 cluster-network-kmp-trace-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-default-2_3.0.101_0.35-0.16.84 gfs2-kmp-trace-2_3.0.101_0.35-0.16.84 ocfs2-kmp-default-1.6_3.0.101_0.35-0.20.78 ocfs2-kmp-trace-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 x86_64): cluster-network-kmp-xen-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-xen-2_3.0.101_0.35-0.16.84 ocfs2-kmp-xen-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise High Availability Extension 11 SP3 (ppc64): cluster-network-kmp-ppc64-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-ppc64-2_3.0.101_0.35-0.16.84 ocfs2-kmp-ppc64-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586): cluster-network-kmp-pae-1.4_3.0.101_0.35-2.27.78 gfs2-kmp-pae-2_3.0.101_0.35-0.16.84 ocfs2-kmp-pae-1.6_3.0.101_0.35-0.20.78 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 3.0.101]: kernel-default-3.0.101-0.35.1 kernel-default-base-3.0.101-0.35.1 kernel-default-devel-3.0.101-0.35.1 kernel-default-extra-3.0.101-0.35.1 kernel-source-3.0.101-0.35.1 kernel-syms-3.0.101-0.35.1 kernel-trace-devel-3.0.101-0.35.1 kernel-xen-3.0.101-0.35.1 kernel-xen-base-3.0.101-0.35.1 kernel-xen-devel-3.0.101-0.35.1 kernel-xen-extra-3.0.101-0.35.1 xen-kmp-default-4.2.4_02_3.0.101_0.35-0.7.45 - SUSE Linux Enterprise Desktop 11 SP3 (i586) [New Version: 3.0.101]: kernel-pae-3.0.101-0.35.1 kernel-pae-base-3.0.101-0.35.1 kernel-pae-devel-3.0.101-0.35.1 kernel-pae-extra-3.0.101-0.35.1 xen-kmp-pae-4.2.4_02_3.0.101_0.35-0.7.45 - SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64): kernel-default-extra-3.0.101-0.35.1 - SLE 11 SERVER Unsupported Extras (i586 x86_64): kernel-xen-extra-3.0.101-0.35.1 - SLE 11 SERVER Unsupported Extras (ppc64): kernel-ppc64-extra-3.0.101-0.35.1 - SLE 11 SERVER Unsupported Extras (i586): kernel-pae-extra-3.0.101-0.35.1 References: http://support.novell.com/security/cve/CVE-2012-2372.html http://support.novell.com/security/cve/CVE-2013-2929.html http://support.novell.com/security/cve/CVE-2013-4299.html http://support.novell.com/security/cve/CVE-2013-4579.html http://support.novell.com/security/cve/CVE-2013-6382.html http://support.novell.com/security/cve/CVE-2013-7339.html http://support.novell.com/security/cve/CVE-2014-0055.html http://support.novell.com/security/cve/CVE-2014-0077.html http://support.novell.com/security/cve/CVE-2014-0101.html http://support.novell.com/security/cve/CVE-2014-0131.html http://support.novell.com/security/cve/CVE-2014-0155.html http://support.novell.com/security/cve/CVE-2014-1444.html http://support.novell.com/security/cve/CVE-2014-1445.html http://support.novell.com/security/cve/CVE-2014-1446.html http://support.novell.com/security/cve/CVE-2014-1874.html http://support.novell.com/security/cve/CVE-2014-2309.html http://support.novell.com/security/cve/CVE-2014-2523.html http://support.novell.com/security/cve/CVE-2014-2678.html http://support.novell.com/security/cve/CVE-2014-2851.html http://support.novell.com/security/cve/CVE-2014-3122.html http://support.novell.com/security/cve/CVE-2014-3144.html http://support.novell.com/security/cve/CVE-2014-3145.html http://support.novell.com/security/cve/CVE-2014-3917.html http://support.novell.com/security/cve/CVE-2014-4652.html http://support.novell.com/security/cve/CVE-2014-4653.html http://support.novell.com/security/cve/CVE-2014-4654.html http://support.novell.com/security/cve/CVE-2014-4655.html http://support.novell.com/security/cve/CVE-2014-4656.html http://support.novell.com/security/cve/CVE-2014-4699.html https://bugzilla.novell.com/767610 https://bugzilla.novell.com/786450 https://bugzilla.novell.com/792271 https://bugzilla.novell.com/821619 https://bugzilla.novell.com/832710 https://bugzilla.novell.com/837563 https://bugzilla.novell.com/840524 https://bugzilla.novell.com/846404 https://bugzilla.novell.com/846690 https://bugzilla.novell.com/847652 https://bugzilla.novell.com/850915 https://bugzilla.novell.com/851426 https://bugzilla.novell.com/851603 https://bugzilla.novell.com/852553 https://bugzilla.novell.com/855126 https://bugzilla.novell.com/857926 https://bugzilla.novell.com/858869 https://bugzilla.novell.com/858870 https://bugzilla.novell.com/858872 https://bugzilla.novell.com/859840 https://bugzilla.novell.com/861636 https://bugzilla.novell.com/861980 https://bugzilla.novell.com/862429 https://bugzilla.novell.com/862934 https://bugzilla.novell.com/863300 https://bugzilla.novell.com/863335 https://bugzilla.novell.com/863410 https://bugzilla.novell.com/863873 https://bugzilla.novell.com/864404 https://bugzilla.novell.com/864464 https://bugzilla.novell.com/865310 https://bugzilla.novell.com/865330 https://bugzilla.novell.com/865882 https://bugzilla.novell.com/866081 https://bugzilla.novell.com/866102 https://bugzilla.novell.com/866615 https://bugzilla.novell.com/866800 https://bugzilla.novell.com/866864 https://bugzilla.novell.com/867362 https://bugzilla.novell.com/867517 https://bugzilla.novell.com/867531 https://bugzilla.novell.com/867723 https://bugzilla.novell.com/867953 https://bugzilla.novell.com/868488 https://bugzilla.novell.com/868528 https://bugzilla.novell.com/868653 https://bugzilla.novell.com/868748 https://bugzilla.novell.com/869033 https://bugzilla.novell.com/869414 https://bugzilla.novell.com/869563 https://bugzilla.novell.com/869934 https://bugzilla.novell.com/870173 https://bugzilla.novell.com/870335 https://bugzilla.novell.com/870450 https://bugzilla.novell.com/870496 https://bugzilla.novell.com/870498 https://bugzilla.novell.com/870576 https://bugzilla.novell.com/870591 https://bugzilla.novell.com/870618 https://bugzilla.novell.com/870877 https://bugzilla.novell.com/870958 https://bugzilla.novell.com/871561 https://bugzilla.novell.com/871634 https://bugzilla.novell.com/871676 https://bugzilla.novell.com/871728 https://bugzilla.novell.com/871854 https://bugzilla.novell.com/871861 https://bugzilla.novell.com/871899 https://bugzilla.novell.com/872188 https://bugzilla.novell.com/872540 https://bugzilla.novell.com/872634 https://bugzilla.novell.com/873061 https://bugzilla.novell.com/873374 https://bugzilla.novell.com/873463 https://bugzilla.novell.com/874108 https://bugzilla.novell.com/874145 https://bugzilla.novell.com/874440 https://bugzilla.novell.com/874577 https://bugzilla.novell.com/875386 https://bugzilla.novell.com/876102 https://bugzilla.novell.com/876114 https://bugzilla.novell.com/876176 https://bugzilla.novell.com/876463 https://bugzilla.novell.com/877013 https://bugzilla.novell.com/877257 https://bugzilla.novell.com/877497 https://bugzilla.novell.com/877775 https://bugzilla.novell.com/878115 https://bugzilla.novell.com/878123 https://bugzilla.novell.com/878274 https://bugzilla.novell.com/878407 https://bugzilla.novell.com/878509 https://bugzilla.novell.com/879921 https://bugzilla.novell.com/879957 https://bugzilla.novell.com/880007 https://bugzilla.novell.com/880357 https://bugzilla.novell.com/880437 https://bugzilla.novell.com/880484 https://bugzilla.novell.com/881571 https://bugzilla.novell.com/881761 https://bugzilla.novell.com/881939 https://bugzilla.novell.com/882324 https://bugzilla.novell.com/883380 https://bugzilla.novell.com/883795 https://bugzilla.novell.com/885725 http://download.suse.com/patch/finder/?keywords=0d90047cc045e1a3930a1deab87758d9 http://download.suse.com/patch/finder/?keywords=13c414107953b996e47ad9beead577e5 http://download.suse.com/patch/finder/?keywords=1b23cbf839dfbac64393f47b25445072 http://download.suse.com/patch/finder/?keywords=1e1024c9ceb6dfbd02087a8e7fc30a41 http://download.suse.com/patch/finder/?keywords=1eb98ba9ebb1cc2e805aa760347c8f35 http://download.suse.com/patch/finder/?keywords=25116cdba8b0bd66ec544a70ecf69581 http://download.suse.com/patch/finder/?keywords=ac3c1f41b2fef1c20481c11cba3927fb http://download.suse.com/patch/finder/?keywords=c05c80da5f8738980eb4c3cf7b7eb43f http://download.suse.com/patch/finder/?keywords=fcdaebb0744ca50e161239dbb665f0d2 http://download.suse.com/patch/finder/?keywords=ff40c298b0b146e85c2548cf99724fd2 From sle-updates at lists.suse.com Thu Jul 17 11:04:15 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 17 Jul 2014 19:04:15 +0200 (CEST) Subject: SUSE-SU-2014:0915-1: moderate: Security update for xorg-x11-libXp Message-ID: <20140717170415.59FF33215B@maintenance.suse.de> SUSE Security Update: Security update for xorg-x11-libXp ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0915-1 Rating: moderate References: #815451 #821668 Cross-References: CVE-2013-2062 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This is a SUSE Linux Enterprise Server 11 SP1 LTSS roll up update of xorg-x11-libXp which fixes a security issue. This issues required a connection to a malicious X server to trigger the bugs in client libraries. * CVE-2013-2062: Multiple integer overflows in X.org libXp allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XpGetAttributes, (2) XpGetOneAttribute, (3) XpGetPrinterList, and (4) XpQueryScreens functions. Security Issues: * CVE-2013-2062 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-xorg-x11-libXp-9386 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): xorg-x11-libXp-7.4-1.18.7 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64): xorg-x11-libXp-32bit-7.4-1.18.7 References: http://support.novell.com/security/cve/CVE-2013-2062.html https://bugzilla.novell.com/815451 https://bugzilla.novell.com/821668 http://download.suse.com/patch/finder/?keywords=c7b3c453bffc798e34982b100fbc018f From sle-updates at lists.suse.com Thu Jul 17 11:06:50 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 17 Jul 2014 19:06:50 +0200 (CEST) Subject: SUSE-SU-2014:0916-1: moderate: Security update for xorg-x11-libxcb Message-ID: <20140717170650.6A9283215B@maintenance.suse.de> SUSE Security Update: Security update for xorg-x11-libxcb ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0916-1 Rating: moderate References: #818829 #821584 Cross-References: CVE-2013-2064 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This is a SUSE Linux Enterprise Server 11 SP1 LTSS roll up update of xorg-x11-libxcb which fixes a security issue. This issues required a connection to a malicious X server to trigger the bugs in client libraries. * CVE-2013-2064: Integer overflow in X.org libxcb allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function. Security Issues: * CVE-2013-2064 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-xorg-x11-libxcb-9392 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): xorg-x11-libxcb-7.4-1.22.5.15 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64): xorg-x11-libxcb-32bit-7.4-1.22.5.15 References: http://support.novell.com/security/cve/CVE-2013-2064.html https://bugzilla.novell.com/818829 https://bugzilla.novell.com/821584 http://download.suse.com/patch/finder/?keywords=6150af8fa09ee22debdd997df1df86ee From sle-updates at lists.suse.com Thu Jul 17 15:04:11 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 17 Jul 2014 23:04:11 +0200 (CEST) Subject: SUSE-RU-2014:0917-1: Recommended update for powerpc-utils Message-ID: <20140717210411.723F83215B@maintenance.suse.de> SUSE Recommended Update: Recommended update for powerpc-utils ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0917-1 Rating: low References: #879310 #879839 Affected Products: SUSE Linux Enterprise Server 11 SP3 ______________________________________________________________________________ An update that has two recommended fixes can now be installed. Description: This update for powerpc-utils fixes the following issues: * Partition fails validation for migration. (bnc#879839) * Incorrect MTMS after previous live partition migration. (bnc#879310) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-powerpc-utils-9374 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 (ppc64): powerpc-utils-1.2.16-0.11.1 References: https://bugzilla.novell.com/879310 https://bugzilla.novell.com/879839 http://download.suse.com/patch/finder/?keywords=e839eefcb24e768e06e3f53acae06cb7 From sle-updates at lists.suse.com Fri Jul 18 11:04:15 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 18 Jul 2014 19:04:15 +0200 (CEST) Subject: SUSE-SU-2014:0919-1: moderate: Security update for xorg-x11-libXrender Message-ID: <20140718170415.E824232160@maintenance.suse.de> SUSE Security Update: Security update for xorg-x11-libXrender ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0919-1 Rating: moderate References: #815451 #821669 Cross-References: CVE-2013-1987 Affected Products: SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This is a SUSE Linux Enterprise Server 11 SP1 LTSS roll up update of xorg-x11-libXrender which fixes a security issue. These issues required a connection to a malicious X server to trigger the bugs in client libraries. Security issue fixed: * CVE-2013-1987: Multiple integer overflows in X.org libXrender allowed X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRenderQueryFilters, (2) XRenderQueryFormats, and (3) XRenderQueryPictIndexValues functions. Security Issues: * CVE-2013-1987 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-xorg-x11-libXrender-9387 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): xorg-x11-libXrender-7.4-1.16.8 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64): xorg-x11-libXrender-32bit-7.4-1.16.8 References: http://support.novell.com/security/cve/CVE-2013-1987.html https://bugzilla.novell.com/815451 https://bugzilla.novell.com/821669 http://download.suse.com/patch/finder/?keywords=aa893ec5f9551a8f552ab062daf80c96 From sle-updates at lists.suse.com Fri Jul 18 17:04:16 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Sat, 19 Jul 2014 01:04:16 +0200 (CEST) Subject: SUSE-SU-2014:0920-1: moderate: Security update for glibc Message-ID: <20140718230416.4A3BB3215C@maintenance.suse.de> SUSE Security Update: Security update for glibc ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0920-1 Rating: moderate References: #882600 #883217 Cross-References: CVE-2014-4043 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: glibc has been updated to fix one security issue that could have resulted in free-after-use situations. More information can be found at http://seclists.org/oss-sec/2014/q2/519 This security issue has been fixed: * posix_spawn_file_actions_addopen fails to copy the path argument (CVE-2014-4043) Also a regression from a previous update has been fixed: * Don't ignore too long lines in nss_files (bnc#883217) Security Issues: * CVE-2014-4043 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-glibc-9477 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-glibc-9477 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-glibc-9477 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-glibc-9477 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64): glibc-html-2.11.3-17.66.1 glibc-info-2.11.3-17.66.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): glibc-2.11.3-17.66.1 glibc-devel-2.11.3-17.66.1 glibc-html-2.11.3-17.66.1 glibc-i18ndata-2.11.3-17.66.1 glibc-info-2.11.3-17.66.1 glibc-locale-2.11.3-17.66.1 glibc-profile-2.11.3-17.66.1 nscd-2.11.3-17.66.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64): glibc-32bit-2.11.3-17.66.1 glibc-devel-32bit-2.11.3-17.66.1 glibc-locale-32bit-2.11.3-17.66.1 glibc-profile-32bit-2.11.3-17.66.1 - SUSE Linux Enterprise Server 11 SP3 (i586 i686 ia64 ppc64 s390x x86_64): glibc-2.11.3-17.66.1 glibc-devel-2.11.3-17.66.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): glibc-html-2.11.3-17.66.1 glibc-i18ndata-2.11.3-17.66.1 glibc-info-2.11.3-17.66.1 glibc-locale-2.11.3-17.66.1 glibc-profile-2.11.3-17.66.1 nscd-2.11.3-17.66.1 - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64): glibc-32bit-2.11.3-17.66.1 glibc-devel-32bit-2.11.3-17.66.1 glibc-locale-32bit-2.11.3-17.66.1 glibc-profile-32bit-2.11.3-17.66.1 - SUSE Linux Enterprise Server 11 SP3 (ia64): glibc-locale-x86-2.11.3-17.66.1 glibc-profile-x86-2.11.3-17.66.1 glibc-x86-2.11.3-17.66.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 i686 x86_64): glibc-2.11.3-17.66.1 glibc-devel-2.11.3-17.66.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): glibc-i18ndata-2.11.3-17.66.1 glibc-locale-2.11.3-17.66.1 nscd-2.11.3-17.66.1 - SUSE Linux Enterprise Desktop 11 SP3 (x86_64): glibc-32bit-2.11.3-17.66.1 glibc-devel-32bit-2.11.3-17.66.1 glibc-locale-32bit-2.11.3-17.66.1 References: http://support.novell.com/security/cve/CVE-2014-4043.html https://bugzilla.novell.com/882600 https://bugzilla.novell.com/883217 http://download.suse.com/patch/finder/?keywords=85b6c311058570298bc3291951b7b4c8 From sle-updates at lists.suse.com Wed Jul 23 15:04:46 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 23 Jul 2014 23:04:46 +0200 (CEST) Subject: SUSE-SU-2014:0928-1: important: Security update for ppc64-diag Message-ID: <20140723210446.2498932166@maintenance.suse.de> SUSE Security Update: Security update for ppc64-diag ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0928-1 Rating: important References: #882667 Cross-References: CVE-2014-4038 CVE-2014-4039 Affected Products: SUSE Linux Enterprise Server 11 SP3 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: ppc64-diag has been updated to prevent the usage of predictable filenames in /tmp in various scripts and daemons (CVE-2014-4038) Also the snapshot tarball was previously generated world readable, which could have leaked sensible information, which is only visible to root, to all users. It is now readable for root only (CVE-2014-4039). Security Issues: * CVE-2014-4038 * CVE-2014-4039 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-ppc64-diag-9533 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 (ppc64): ppc64-diag-2.6.1-0.14.1 References: http://support.novell.com/security/cve/CVE-2014-4038.html http://support.novell.com/security/cve/CVE-2014-4039.html https://bugzilla.novell.com/882667 http://download.suse.com/patch/finder/?keywords=26da23b6b57c4c1578e0de40de51309c From sle-updates at lists.suse.com Wed Jul 23 17:04:47 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 24 Jul 2014 01:04:47 +0200 (CEST) Subject: SUSE-RU-2014:0929-1: Recommended update for release-notes-sles Message-ID: <20140723230447.7B20C3214F@maintenance.suse.de> SUSE Recommended Update: Recommended update for release-notes-sles ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0929-1 Rating: low References: #847238 Affected Products: SUSE Linux Enterprise Server 10 SP4 LTSS ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update provides the latest version of the release notes for SUSE Linux Enterprise Server 10 SP4 LTSS which documents the update of Mozilla Firefox to version 24 ESR. Package List: - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64) [New Version: 10.4.13]: release-notes-sles-10.4.13-0.11.1 References: https://bugzilla.novell.com/847238 http://download.suse.com/patch/finder/?keywords=99c5ab4197a789482e7aba30c2833090 From sle-updates at lists.suse.com Wed Jul 23 19:04:47 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 24 Jul 2014 03:04:47 +0200 (CEST) Subject: SUSE-SU-2014:0930-1: moderate: Security update for kdirstat Message-ID: <20140724010447.07B553214F@maintenance.suse.de> SUSE Security Update: Security update for kdirstat ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0930-1 Rating: moderate References: #868682 Cross-References: CVE-2014-2527 CVE-2014-2528 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: The following security issue has been fixed: * #868682: CVE-2014-2527 CVE-2014-2528: kdirstat: command injection in kcleanup Security Issues: * CVE-2014-2527 * CVE-2014-2528 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-kdirstat-9515 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-kdirstat-9515 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-kdirstat-9515 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): kdirstat-2.4.4-255.28.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): kdirstat-2.4.4-255.28.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): kdirstat-2.4.4-255.28.1 References: http://support.novell.com/security/cve/CVE-2014-2527.html http://support.novell.com/security/cve/CVE-2014-2528.html https://bugzilla.novell.com/868682 http://download.suse.com/patch/finder/?keywords=a3c61a48a0b6d5b78149249905201f2e From sle-updates at lists.suse.com Wed Jul 23 19:05:13 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 24 Jul 2014 03:05:13 +0200 (CEST) Subject: SUSE-SU-2014:0931-1: important: Security update for libtasn1 Message-ID: <20140724010513.AF07632166@maintenance.suse.de> SUSE Security Update: Security update for libtasn1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0931-1 Rating: important References: #880735 #880737 #880738 Cross-References: CVE-2014-3467 CVE-2014-3468 CVE-2014-3469 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: libtasn1 has been updated to fix three security issues: * asn1_get_bit_der() could have returned negative bit length (CVE-2014-3468) * Multiple boundary check issues could have allowed DoS (CVE-2014-3467) * Possible DoS by NULL pointer dereference in asn1_read_value_type (CVE-2014-3469) Security Issues: * CVE-2014-3468 * CVE-2014-3467 * CVE-2014-3469 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-libtasn1-9528 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-libtasn1-9528 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-libtasn1-9528 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-libtasn1-9528 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): libtasn1-devel-1.5-1.28.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): libtasn1-1.5-1.28.1 libtasn1-3-1.5-1.28.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (x86_64): libtasn1-3-32bit-1.5-1.28.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): libtasn1-1.5-1.28.1 libtasn1-3-1.5-1.28.1 - SUSE Linux Enterprise Server 11 SP3 (ppc64 s390x x86_64): libtasn1-3-32bit-1.5-1.28.1 - SUSE Linux Enterprise Server 11 SP3 (ia64): libtasn1-3-x86-1.5-1.28.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): libtasn1-1.5-1.28.1 libtasn1-3-1.5-1.28.1 - SUSE Linux Enterprise Desktop 11 SP3 (x86_64): libtasn1-3-32bit-1.5-1.28.1 References: http://support.novell.com/security/cve/CVE-2014-3467.html http://support.novell.com/security/cve/CVE-2014-3468.html http://support.novell.com/security/cve/CVE-2014-3469.html https://bugzilla.novell.com/880735 https://bugzilla.novell.com/880737 https://bugzilla.novell.com/880738 http://download.suse.com/patch/finder/?keywords=c519e17b9f1f9f2c0888e237f0b42f05 From sle-updates at lists.suse.com Thu Jul 24 11:04:46 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 24 Jul 2014 19:04:46 +0200 (CEST) Subject: SUSE-RU-2014:0929-2: Recommended update for release-notes-sles Message-ID: <20140724170446.0495832164@maintenance.suse.de> SUSE Recommended Update: Recommended update for release-notes-sles ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0929-2 Rating: low References: #847238 Affected Products: SUSE Linux Enterprise Server 11 SP2 LTSS ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This update provides the latest version of the release notes for SUSE Linux Enterprise Server 11 SP2 LTSS. The changes in detail are: * Firefox update to version 24 ESR. (bnc#847238 via fate#316623) * openSSH with Cryptographic Hardware Acceleration. (fate#308239) Contraindications: Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 LTSS: zypper in -t patch slessp2-release-notes-sles-201407-9502 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64) [New Version: 11.2.0.51]: release-notes-sles-11.2.0.51-0.5.1 References: https://bugzilla.novell.com/847238 http://download.suse.com/patch/finder/?keywords=ea124257c56d196b983e84732bfd2e67 From sle-updates at lists.suse.com Fri Jul 25 15:04:45 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 25 Jul 2014 23:04:45 +0200 (CEST) Subject: SUSE-RU-2014:0932-1: Recommended update for the Administration Guide for SUSE Linux Enterprise High Availability Extension 11 SP3. Message-ID: <20140725210445.EB81332166@maintenance.suse.de> SUSE Recommended Update: Recommended update for the Administration Guide for SUSE Linux Enterprise High Availability Extension 11 SP3. ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0932-1 Rating: low References: #879928 Affected Products: SUSE Linux Enterprise High Availability Extension 11 SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update provides the latest revision of the Administration Guide for SUSE Linux Enterprise High Availability Extension 11 SP3. Contraindications: Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise High Availability Extension 11 SP3: zypper in -t patch slehasp3-sle-ha-guide_en-pdf-9398 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise High Availability Extension 11 SP3 (noarch): sle-ha-guide_en-pdf-11.3-0.19.1 sle-ha-manuals_en-11.3-0.19.1 sle-ha-nfs-quick_en-pdf-11.3-0.19.1 References: https://bugzilla.novell.com/879928 http://download.suse.com/patch/finder/?keywords=0a353af40090242c943528160b03bab4 From sle-updates at lists.suse.com Mon Jul 28 11:05:29 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 28 Jul 2014 19:05:29 +0200 (CEST) Subject: SUSE-RU-2014:0933-1: Recommended update for release-notes-sled Message-ID: <20140728170529.86D0132168@maintenance.suse.de> SUSE Recommended Update: Recommended update for release-notes-sled ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0933-1 Rating: low References: #837456 #878320 #878333 #878607 #886256 Affected Products: SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that has 5 recommended fixes can now be installed. It includes one version update. Description: This update provides the latest version of the release notes for SUSE Linux Enterprise Desktop 11 SP3. The changes in detail are: * Packages mokutils and shim are x86_64 only. (bnc#878320, via fate#314796) * Firefox update to version 24 ESR. (bnc#886256 via fate#316623) * More details about MySQL migration. (bnc#837456 via fate#314322) * Fixed some typos. (bnc#878333) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-release-notes-sled-9501 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP3 (noarch) [New Version: 11.3.27]: release-notes-sled-11.3.27-0.7.1 References: https://bugzilla.novell.com/837456 https://bugzilla.novell.com/878320 https://bugzilla.novell.com/878333 https://bugzilla.novell.com/878607 https://bugzilla.novell.com/886256 http://download.suse.com/patch/finder/?keywords=06f1cc7d15c4af84c2fc8cd7abf3c915 From sle-updates at lists.suse.com Mon Jul 28 13:04:46 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Mon, 28 Jul 2014 21:04:46 +0200 (CEST) Subject: SUSE-RU-2014:0934-1: Recommended update for lvm2 Message-ID: <20140728190446.7FA7D32168@maintenance.suse.de> SUSE Recommended Update: Recommended update for lvm2 ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0934-1 Rating: low References: #813017 #831401 #837538 #854092 #867617 #869927 #875650 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise High Availability Extension 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that has 7 recommended fixes can now be installed. Description: This collective update for lvm2 and lvm2-clvm provides fixes for the following issues: * OCFS2 filesystem hang after loss of half of mirrored LV on cLVM. (bnc#813017) * Buffer overflow in "pvscan -u" when pv name is longer than 128bytes. (bnc#831401) * Boot fails due to volume group hosting root device not being found on reboot because VG is activated before PV detection completes. (bnc#875650) * LVM volumes on iSCSI are not activated on boot. (bnc#867617) * Running LVM commands with nohup(1) fail with errors. (bnc#854092) * Combination of iSCSI, multipath, md-raid, and LVM causes file systems to not mount after boot. (bnc#869927) * Failed start of lvm resource on resource switch. (bnc#837538) Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-lvm-clvm-201406-9453 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-lvm-clvm-201406-9453 - SUSE Linux Enterprise High Availability Extension 11 SP3: zypper in -t patch slehasp3-lvm-clvm-201406-9453 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-lvm-clvm-201406-9453 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): lvm2-2.02.98-0.29.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): lvm2-2.02.98-0.29.1 - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64): lvm2-clvm-2.02.98-0.29.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): lvm2-2.02.98-0.29.1 References: https://bugzilla.novell.com/813017 https://bugzilla.novell.com/831401 https://bugzilla.novell.com/837538 https://bugzilla.novell.com/854092 https://bugzilla.novell.com/867617 https://bugzilla.novell.com/869927 https://bugzilla.novell.com/875650 http://download.suse.com/patch/finder/?keywords=757be274b9a3510038aa68c9a472d795 From sle-updates at lists.suse.com Tue Jul 29 11:04:45 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 29 Jul 2014 19:04:45 +0200 (CEST) Subject: SUSE-RU-2014:0935-1: moderate: Recommended update for SUSE Manager Server 2.1 Message-ID: <20140729170445.BA9E532168@maintenance.suse.de> SUSE Recommended Update: Recommended update for SUSE Manager Server 2.1 ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0935-1 Rating: moderate References: #872298 #872351 #879998 #880001 #880081 #880327 #880388 #881522 #881711 Affected Products: SUSE Manager Server ______________________________________________________________________________ An update that has 9 recommended fixes can now be installed. Description: This collective update for SUSE Manager Server 2.1 provides the following fixes and enhancements: auditlog-keeper: * Fix value too long for type character varying(2048). (bnc#872351) osad: * Call python using the -s option. rhnlib: * Ensure bytes strings are sent to pyOpenSSL. (bnc#880388) rhnpush: * Add default path structure to proxy lookaside that avoids collisions. * Make rhnpush backwards-compatible with old spacewalk-proxy. spacecmd: * Added option to force deployment of a config channel to all subscribed systems. * Added last boot message in system_details command. * Updated kickstart_import documentation. * Added kickstart_import_raw command. spacewalk-backend: * Additional spacewalk backend methods and capability needed. * Spacewalk changes needed to support collisionless proxy lookaside. spacewalk-branding: * CVE patches adapted for colour blind users. (bnc#872298) * Underline in icons is removed. (bnc#880001) spacewalk-java: * New page added for viewing channels a repo is associated to. * Allow pasting of keys into textarea. * Provide a faster systemgroup.listSystemsMinimal API method. * Disable caching of Locale between page loads. * Add spacewalk-report for systems with extra packages. * Improve performance of Systems with Extra Packages query. * System Event History page: fix link to pending events on Oracle databases. * Fix human dates now() staying unmodified. (bnc#880081) * Escape package name to prevent from script injection. * Allow for null evr and archs on event history detail. (bnc#880327) * Disable form autocompletion in some places. (bnc#879998) * Add errata type selection to SSM page. * Fix datepicker time at xx:xx PM pre-filled with xx:xx AM. (bnc#881522) spacewalk-reports: * Use base_channel_id and child_channel_id instead of channel_id in activation_key report. * Added channel- and server-group-ids to activation-keys. * Spacewalk-report fix allows all activation-key info to live in one report. * Added spacewalk-report for systems with extra packages. spacewalk-setup: * Setup /etc/sudoers in SUSE Manager upgrade scripts (bnc#881711) spacewalk-utils: * Fixed spacewalk-hostname-rename to work with PostgreSQL backend. * Added limitation of spacewalk-clone-by-date for RHEL4 and earlier. spacewalk-web: * Add development_environment to rhn_web.conf. susemanager-schema: * Index for user_id on wupi table speeds up errata mailer. * Copy upstream schema migration to SUSE Manager schema upgrade. susemanager: * Update the sudoers file after SUSE Manager upgrade. (bnc#881711) * Fix oracle2postgres.sh (database configuration). How to apply this update: 1. Log in as root user to the SUSE Manager server. 2. Stop the Spacewalk service: spacewalk-service stop 3. Apply the patch using either zypper patch or YaST Online Update. 4. Upgrade the database schema with spacewalk-schema-upgrade 5. Start the Spacewalk service: spacewalk-service start Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager Server: zypper in -t patch sleman21-suse-manager-21-201406-9430 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager Server (x86_64): release-notes-susemanager-2.1.0-0.28.10 rhnlib-2.5.69.4-0.7.4 spacecmd-2.1.25.3-0.7.6 spacewalk-backend-2.1.55.8-0.7.6 spacewalk-backend-app-2.1.55.8-0.7.6 spacewalk-backend-applet-2.1.55.8-0.7.6 spacewalk-backend-config-files-2.1.55.8-0.7.6 spacewalk-backend-config-files-common-2.1.55.8-0.7.6 spacewalk-backend-config-files-tool-2.1.55.8-0.7.6 spacewalk-backend-iss-2.1.55.8-0.7.6 spacewalk-backend-iss-export-2.1.55.8-0.7.6 spacewalk-backend-libs-2.1.55.8-0.7.6 spacewalk-backend-package-push-server-2.1.55.8-0.7.6 spacewalk-backend-server-2.1.55.8-0.7.6 spacewalk-backend-sql-2.1.55.8-0.7.6 spacewalk-backend-sql-oracle-2.1.55.8-0.7.6 spacewalk-backend-sql-postgresql-2.1.55.8-0.7.6 spacewalk-backend-tools-2.1.55.8-0.7.6 spacewalk-backend-xml-export-libs-2.1.55.8-0.7.6 spacewalk-backend-xmlrpc-2.1.55.8-0.7.6 spacewalk-branding-2.1.33.7-0.7.3 susemanager-2.1.11-0.7.7 susemanager-tools-2.1.11-0.7.7 - SUSE Manager Server (noarch): auditlog-keeper-0.2.3+git.1401721172.4d6e37e-0.7.14 auditlog-keeper-rdbms-0.2.3+git.1401721172.4d6e37e-0.7.14 auditlog-keeper-spacewalk-validator-0.2.3+git.1401721172.4d6e37e-0.7.14 auditlog-keeper-syslog-0.2.3+git.1401721172.4d6e37e-0.7.14 auditlog-keeper-xmlout-0.2.3+git.1401721172.4d6e37e-0.7.14 osa-dispatcher-5.11.33.3-0.7.4 perl-auditlog-keeper-client-0.2.3+git.1401721172.4d6e37e-0.7.14 rhnpush-5.5.71.5-0.7.7 spacewalk-base-2.1.60.7-0.7.4 spacewalk-base-minimal-2.1.60.7-0.7.4 spacewalk-base-minimal-config-2.1.60.7-0.7.4 spacewalk-grail-2.1.60.7-0.7.4 spacewalk-html-2.1.60.7-0.7.4 spacewalk-java-2.1.165.6-0.7.3 spacewalk-java-config-2.1.165.6-0.7.3 spacewalk-java-lib-2.1.165.6-0.7.3 spacewalk-java-oracle-2.1.165.6-0.7.3 spacewalk-java-postgresql-2.1.165.6-0.7.3 spacewalk-pxt-2.1.60.7-0.7.4 spacewalk-reports-2.1.14.5-0.7.4 spacewalk-setup-2.1.14.5-0.7.4 spacewalk-sniglets-2.1.60.7-0.7.4 spacewalk-taskomatic-2.1.165.6-0.7.3 spacewalk-utils-2.1.27.7-0.7.4 susemanager-schema-2.1.50.6-0.7.4 References: https://bugzilla.novell.com/872298 https://bugzilla.novell.com/872351 https://bugzilla.novell.com/879998 https://bugzilla.novell.com/880001 https://bugzilla.novell.com/880081 https://bugzilla.novell.com/880327 https://bugzilla.novell.com/880388 https://bugzilla.novell.com/881522 https://bugzilla.novell.com/881711 http://download.suse.com/patch/finder/?keywords=76ba37c7b7c90220c9d930b2137f7581 From sle-updates at lists.suse.com Tue Jul 29 11:06:53 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 29 Jul 2014 19:06:53 +0200 (CEST) Subject: SUSE-RU-2014:0936-1: moderate: Recommended update for SUSE Manager Proxy 2.1 Message-ID: <20140729170653.31AEE32168@maintenance.suse.de> SUSE Recommended Update: Recommended update for SUSE Manager Proxy 2.1 ______________________________________________________________________________ Announcement ID: SUSE-RU-2014:0936-1 Rating: moderate References: #880388 Affected Products: SUSE Manager Proxy SUSE Manager Client Tools for SLE 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. It includes one version update. Description: This collective update for SUSE Manager Proxy 2.1 provides the following fixes and enhancements: osad: * Call python using the -s option. rhncfg: * list/elist: Allow user to specify list of files. rhnlib: * Ensure bytes strings are sent to pyOpenSSL. (bnc#880388) rhnpush: * Add default path structure to proxy lookaside that avoids collisions. * Make rhnpush backwards-compatible with old spacewalk-proxy. spacewalk-backend: * Additional spacewalk backend methods and capability needed. * Spacewalk changes needed to support collisionless proxy lookaside. spacewalk-proxy: * Add default path structure to proxy lookaside that avoids collisions. * rhn_package_manager should not force md5, use package headers. spacewalk-web: * Add development_environment to rhn_web.conf. How to apply this update: 1. Log in as root user to the SUSE Manager proxy. 2. Stop the proxy service: spacewalk-proxy stop 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: spacewalk-proxy start Patch Instructions: To install this SUSE Recommended Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager Proxy: zypper in -t patch slemap21-suse-manager-proxy-21-201406-9399 - SUSE Manager Client Tools for SLE 11 SP3: zypper in -t patch slesctsp3-client-tools-21-201406-9393 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-rhnlib-9436 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-rhnlib-9436 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-rhnlib-9436 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager Proxy (x86_64): rhnlib-2.5.69.4-0.7.1 spacewalk-backend-2.1.55.8-0.7.1 spacewalk-backend-libs-2.1.55.8-0.7.1 - SUSE Manager Proxy (noarch): osad-5.11.33.3-0.7.1 rhncfg-5.10.65.5-0.7.2 rhncfg-actions-5.10.65.5-0.7.2 rhncfg-client-5.10.65.5-0.7.2 rhncfg-management-5.10.65.5-0.7.2 rhnpush-5.5.71.5-0.7.2 spacewalk-base-minimal-2.1.60.7-0.7.1 spacewalk-base-minimal-config-2.1.60.7-0.7.1 spacewalk-proxy-broker-2.1.15.4-0.7.1 spacewalk-proxy-common-2.1.15.4-0.7.1 spacewalk-proxy-management-2.1.15.4-0.7.1 spacewalk-proxy-package-manager-2.1.15.4-0.7.1 spacewalk-proxy-redirect-2.1.15.4-0.7.1 - SUSE Manager Client Tools for SLE 11 SP3 (i586 ia64 ppc64 s390x x86_64): rhnlib-2.5.69.4-0.7.1 spacewalk-backend-libs-2.1.55.8-0.7.1 - SUSE Manager Client Tools for SLE 11 SP3 (noarch): osad-5.11.33.3-0.7.1 rhncfg-5.10.65.5-0.7.2 rhncfg-actions-5.10.65.5-0.7.2 rhncfg-client-5.10.65.5-0.7.2 rhncfg-management-5.10.65.5-0.7.2 rhnpush-5.5.71.5-0.7.2 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64) [New Version: 2.5.69.4]: rhnlib-2.5.69.4-0.7.6 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.5.69.4]: rhnlib-2.5.69.4-0.7.6 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64) [New Version: 2.5.69.4]: rhnlib-2.5.69.4-0.7.6 References: https://bugzilla.novell.com/880388 http://download.suse.com/patch/finder/?keywords=01224cb9b188232219a3f2c31600db95 http://download.suse.com/patch/finder/?keywords=50820d4e3026585a165d0c1301a76775 http://download.suse.com/patch/finder/?keywords=dab525925ed14d8c9eb1955b1585614f From sle-updates at lists.suse.com Wed Jul 30 03:04:46 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 30 Jul 2014 11:04:46 +0200 (CEST) Subject: SUSE-SU-2014:0937-1: moderate: Security update for ntp Message-ID: <20140730090446.4582E32169@maintenance.suse.de> SUSE Security Update: Security update for ntp ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0937-1 Rating: moderate References: #838458 #857195 Cross-References: CVE-2013-5211 Affected Products: SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 SUSE Linux Enterprise Desktop 11 SP3 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: The NTP time service could have been used for remote denial of service amplification attacks. This issue can be fixed by the administrator as we described in our security advisory SUSE-SA:2014:001: http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00005.html and on http://support.novell.com/security/cve/CVE-2013-5211.html This update now also replaces the default ntp.conf template to fix this problem. Please note that if you have touched or modified ntp.conf yourself, it will not be automatically fixed, you need to merge the changes manually as described. Additionally the following bug has been fixed: * ntp start script does not update the /var/lib/ntp/etc/localtime file if /etc/localtime is a symlink (bnc#838458) Security Issues: * CVE-2013-5211 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-ntp-9540 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-ntp-9540 - SUSE Linux Enterprise Desktop 11 SP3: zypper in -t patch sledsp3-ntp-9540 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): ntp-4.2.4p8-1.24.1 ntp-doc-4.2.4p8-1.24.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): ntp-4.2.4p8-1.24.1 ntp-doc-4.2.4p8-1.24.1 - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64): ntp-4.2.4p8-1.24.1 ntp-doc-4.2.4p8-1.24.1 References: http://support.novell.com/security/cve/CVE-2013-5211.html https://bugzilla.novell.com/838458 https://bugzilla.novell.com/857195 http://download.suse.com/patch/finder/?keywords=e8a33c36efe4158bcc991b731d0881a0 From sle-updates at lists.suse.com Wed Jul 30 04:04:44 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Wed, 30 Jul 2014 12:04:44 +0200 (CEST) Subject: SUSE-SU-2014:0938-1: moderate: Security update for PHP 5.3 Message-ID: <20140730100445.02F9332169@maintenance.suse.de> SUSE Security Update: Security update for PHP 5.3 ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0938-1 Rating: moderate References: #884986 #884987 #884989 #884990 #884991 #884992 #885961 #886059 #886060 Cross-References: CVE-2014-0207 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480 CVE-2014-3487 CVE-2014-3515 CVE-2014-4670 CVE-2014-4698 CVE-2014-4721 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP3 SUSE Linux Enterprise Server 11 SP3 for VMware SUSE Linux Enterprise Server 11 SP3 ______________________________________________________________________________ An update that fixes 9 vulnerabilities is now available. Description: PHP 5.3 has been updated to fix several security problems: * CVE-2014-3515: The SPL component in PHP incorrectly anticipated that certain data structures will have the array data type after unserialization, which allowed remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage. * CVE-2014-0207: The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP allowed remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file. * CVE-2014-3478: Buffer overflow in the mconvert function in softmagic.c in file before 5.19, as used in the Fileinfo component in PHP allowed remote attackers to cause a denial of service (application crash) via a crafted Pascal string in a FILE_PSTRING conversion. * CVE-2014-3479: The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP relied on incorrect sector-size data, which allowed remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file. * CVE-2014-3480: The cdf_count_chain function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP did not properly validate sector-count data, which allowed remote attackers to cause a denial of service (application crash) via a crafted CDF file. * CVE-2014-3487: The cdf_read_property_info function in file before 5.19, as used in the Fileinfo component in PHP did not properly validate a stream offset, which allowed remote attackers to cause a denial of service (application crash) via a crafted CDF file. * CVE-2014-4670: Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP allowed context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments. * CVE-2014-4698: Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP allowed context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments. * CVE-2014-4721: The phpinfo implementation in ext/standard/info.c in PHP did not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php. Security Issues: * CVE-2014-0207 * CVE-2014-3478 * CVE-2014-3479 * CVE-2014-3480 * CVE-2014-3487 * CVE-2014-3515 * CVE-2014-4670 * CVE-2014-4698 * CVE-2014-4721 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP3: zypper in -t patch sdksp3-apache2-mod_php53-9537 - SUSE Linux Enterprise Server 11 SP3 for VMware: zypper in -t patch slessp3-apache2-mod_php53-9537 - SUSE Linux Enterprise Server 11 SP3: zypper in -t patch slessp3-apache2-mod_php53-9537 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64): php53-devel-5.3.17-0.27.1 php53-imap-5.3.17-0.27.1 php53-posix-5.3.17-0.27.1 php53-readline-5.3.17-0.27.1 php53-sockets-5.3.17-0.27.1 php53-sqlite-5.3.17-0.27.1 php53-tidy-5.3.17-0.27.1 - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64): apache2-mod_php53-5.3.17-0.27.1 php53-5.3.17-0.27.1 php53-bcmath-5.3.17-0.27.1 php53-bz2-5.3.17-0.27.1 php53-calendar-5.3.17-0.27.1 php53-ctype-5.3.17-0.27.1 php53-curl-5.3.17-0.27.1 php53-dba-5.3.17-0.27.1 php53-dom-5.3.17-0.27.1 php53-exif-5.3.17-0.27.1 php53-fastcgi-5.3.17-0.27.1 php53-fileinfo-5.3.17-0.27.1 php53-ftp-5.3.17-0.27.1 php53-gd-5.3.17-0.27.1 php53-gettext-5.3.17-0.27.1 php53-gmp-5.3.17-0.27.1 php53-iconv-5.3.17-0.27.1 php53-intl-5.3.17-0.27.1 php53-json-5.3.17-0.27.1 php53-ldap-5.3.17-0.27.1 php53-mbstring-5.3.17-0.27.1 php53-mcrypt-5.3.17-0.27.1 php53-mysql-5.3.17-0.27.1 php53-odbc-5.3.17-0.27.1 php53-openssl-5.3.17-0.27.1 php53-pcntl-5.3.17-0.27.1 php53-pdo-5.3.17-0.27.1 php53-pear-5.3.17-0.27.1 php53-pgsql-5.3.17-0.27.1 php53-pspell-5.3.17-0.27.1 php53-shmop-5.3.17-0.27.1 php53-snmp-5.3.17-0.27.1 php53-soap-5.3.17-0.27.1 php53-suhosin-5.3.17-0.27.1 php53-sysvmsg-5.3.17-0.27.1 php53-sysvsem-5.3.17-0.27.1 php53-sysvshm-5.3.17-0.27.1 php53-tokenizer-5.3.17-0.27.1 php53-wddx-5.3.17-0.27.1 php53-xmlreader-5.3.17-0.27.1 php53-xmlrpc-5.3.17-0.27.1 php53-xmlwriter-5.3.17-0.27.1 php53-xsl-5.3.17-0.27.1 php53-zip-5.3.17-0.27.1 php53-zlib-5.3.17-0.27.1 - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64): apache2-mod_php53-5.3.17-0.27.1 php53-5.3.17-0.27.1 php53-bcmath-5.3.17-0.27.1 php53-bz2-5.3.17-0.27.1 php53-calendar-5.3.17-0.27.1 php53-ctype-5.3.17-0.27.1 php53-curl-5.3.17-0.27.1 php53-dba-5.3.17-0.27.1 php53-dom-5.3.17-0.27.1 php53-exif-5.3.17-0.27.1 php53-fastcgi-5.3.17-0.27.1 php53-fileinfo-5.3.17-0.27.1 php53-ftp-5.3.17-0.27.1 php53-gd-5.3.17-0.27.1 php53-gettext-5.3.17-0.27.1 php53-gmp-5.3.17-0.27.1 php53-iconv-5.3.17-0.27.1 php53-intl-5.3.17-0.27.1 php53-json-5.3.17-0.27.1 php53-ldap-5.3.17-0.27.1 php53-mbstring-5.3.17-0.27.1 php53-mcrypt-5.3.17-0.27.1 php53-mysql-5.3.17-0.27.1 php53-odbc-5.3.17-0.27.1 php53-openssl-5.3.17-0.27.1 php53-pcntl-5.3.17-0.27.1 php53-pdo-5.3.17-0.27.1 php53-pear-5.3.17-0.27.1 php53-pgsql-5.3.17-0.27.1 php53-pspell-5.3.17-0.27.1 php53-shmop-5.3.17-0.27.1 php53-snmp-5.3.17-0.27.1 php53-soap-5.3.17-0.27.1 php53-suhosin-5.3.17-0.27.1 php53-sysvmsg-5.3.17-0.27.1 php53-sysvsem-5.3.17-0.27.1 php53-sysvshm-5.3.17-0.27.1 php53-tokenizer-5.3.17-0.27.1 php53-wddx-5.3.17-0.27.1 php53-xmlreader-5.3.17-0.27.1 php53-xmlrpc-5.3.17-0.27.1 php53-xmlwriter-5.3.17-0.27.1 php53-xsl-5.3.17-0.27.1 php53-zip-5.3.17-0.27.1 php53-zlib-5.3.17-0.27.1 References: http://support.novell.com/security/cve/CVE-2014-0207.html http://support.novell.com/security/cve/CVE-2014-3478.html http://support.novell.com/security/cve/CVE-2014-3479.html http://support.novell.com/security/cve/CVE-2014-3480.html http://support.novell.com/security/cve/CVE-2014-3487.html http://support.novell.com/security/cve/CVE-2014-3515.html http://support.novell.com/security/cve/CVE-2014-4670.html http://support.novell.com/security/cve/CVE-2014-4698.html http://support.novell.com/security/cve/CVE-2014-4721.html https://bugzilla.novell.com/884986 https://bugzilla.novell.com/884987 https://bugzilla.novell.com/884989 https://bugzilla.novell.com/884990 https://bugzilla.novell.com/884991 https://bugzilla.novell.com/884992 https://bugzilla.novell.com/885961 https://bugzilla.novell.com/886059 https://bugzilla.novell.com/886060 http://download.suse.com/patch/finder/?keywords=74f92bf84c32eeb37f3d82282f403b49 From sle-updates at lists.suse.com Thu Jul 31 11:04:14 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Thu, 31 Jul 2014 19:04:14 +0200 (CEST) Subject: SUSE-SU-2014:0955-1: important: Security update for lzo Message-ID: <20140731170414.8AF3532000@maintenance.suse.de> SUSE Security Update: Security update for lzo ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0955-1 Rating: important References: #883947 Cross-References: CVE-2014-4607 Affected Products: SUSE Linux Enterprise Server 11 SP2 LTSS SUSE Linux Enterprise Server 11 SP1 LTSS SUSE Linux Enterprise Server 10 SP4 LTSS SUSE Linux Enterprise Server 10 SP3 LTSS ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: lzo has been updated to fix a potential denial of service issue or possible remote code execution by allowing an attacker, if the LZO decompression algorithm is used in a threaded or kernel context, to corrupt memory structures that control the flow of execution in other contexts. (CVE-2014-4607) Security Issues: * CVE-2014-4607 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 LTSS: zypper in -t patch slessp2-liblzo2-2-9522 - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-liblzo2-2-9521 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 s390x x86_64): liblzo2-2-2.03-12.3.1 - SUSE Linux Enterprise Server 11 SP2 LTSS (s390x x86_64): liblzo2-2-32bit-2.03-12.3.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): liblzo2-2-2.03-12.3.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64): liblzo2-2-32bit-2.03-12.3.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64): lzo-2.02-12.10.1 lzo-devel-2.02-12.10.1 - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64): lzo-32bit-2.02-12.10.1 lzo-devel-32bit-2.02-12.10.1 - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64): lzo-2.02-12.10.1 lzo-devel-2.02-12.10.1 - SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64): lzo-32bit-2.02-12.10.1 lzo-devel-32bit-2.02-12.10.1 References: http://support.novell.com/security/cve/CVE-2014-4607.html https://bugzilla.novell.com/883947 http://download.suse.com/patch/finder/?keywords=53e03c0ab7cec114a28a4a37b4edfa47 http://download.suse.com/patch/finder/?keywords=8a13db4a6cefecad6461ab5197a5debd http://download.suse.com/patch/finder/?keywords=ac9e06dc2568672fcb7aa56123a79f50 http://download.suse.com/patch/finder/?keywords=ece9a97b1932fc3a814dad7078fade74 From sle-updates at lists.suse.com Thu Jul 31 19:04:13 2014 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Fri, 1 Aug 2014 03:04:13 +0200 (CEST) Subject: SUSE-SU-2014:0956-1: moderate: Security update for apache2-mod_wsgi Message-ID: <20140801010413.2650632068@maintenance.suse.de> SUSE Security Update: Security update for apache2-mod_wsgi ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0956-1 Rating: moderate References: #878550 #878553 Cross-References: CVE-2014-0240 Affected Products: SUSE Manager Server SUSE Manager Proxy ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: The following issues have been fixed in mod_wsgi: * Information exposure (bnc#878553): CVE-2014-0242 * Local privilege escalation (bnc#878550): CVE-2014-0240 Security Issues: * CVE-2014-0240 * CVE-2014-0242 Indications: Everybody should update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager Server: zypper in -t patch sleman21-apache2-mod_wsgi-9519 - SUSE Manager Proxy: zypper in -t patch slemap21-apache2-mod_wsgi-9519 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager Server (x86_64): apache2-mod_wsgi-3.3-5.5.5 - SUSE Manager Proxy (x86_64): apache2-mod_wsgi-3.3-5.5.5 References: http://support.novell.com/security/cve/CVE-2014-0240.html https://bugzilla.novell.com/878550 https://bugzilla.novell.com/878553 http://download.suse.com/patch/finder/?keywords=8b2a59506e4d8fbd4e22d24f2e219f86