SUSE-SU-2012:1350-1: moderate: Security update for Linux kernel
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Mon Oct 15 16:09:05 MDT 2012
SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:1350-1
Rating: moderate
References: #698102 #731035 #740291 #744198 #753617 #754670
#761774 #762099 #762214 #762693 #763198 #763954
#764209 #764900 #766156 #766654 #768084 #768504
#769035 #769195 #769251 #769407 #770034 #770695
#770763 #771706 #772407 #772427 #772473 #772786
#772831 #773007 #773319 #773320 #773688 #773831
#774073 #774289 #774612 #774902 #774973 #775182
#775373 #775984 #776019 #776095 #776787 #776896
#777024 #777269 #778082 #778822 #779330 #779461
#779699 #780012 #780461 #781018 #781134
Cross-References: CVE-2012-2745
Affected Products:
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise High Availability Extension 11 SP2
SUSE Linux Enterprise Desktop 11 SP2
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that solves one vulnerability and has 58 fixes is
now available. It includes one version update.
Description:
The SUSE Linux Enterprise 11 SP2 kernel was updated to
3.0.42 which fixes various bugs and security issues.
The following security issues have been fixed:
* CVE-2012-2745: A denial of service in key management
was fixed. (This was fixed in 3.0.28 already, but is listed
here.)
Some more security and bug fixes might already be part of
the 3.0.42 stable kernel release which is included here.
The following non security issues have been fixed:
BTRFS:
* btrfs: allow setting NOCOW for a zero sized file via
ioctl
* btrfs: fix a bug of per-file nocow
* btrfs: fix the missing error information in
create_pending_snapshot()
* btrfs: fix off-by-one in file clone
* btrfs: move transaction aborts to the point of failure
* btrfs: fix unnecessary warning when the fragments
make the space alloc fail
* btrfs: return EPERM upon rmdir on a subvolume
* btrfs: cleanup for duplicated code in find_free_extent
* btrfs: cleanup fs_info->hashers
* btrfs: use vfree instead of kfree
* btrfs: fix error path in create_pending_snapshot()
* btrfs: fix file extent discount problem in the,
snapshot
* btrfs: fix full backref problem when inserting shared
block reference
* btrfs: fix wrong size for the reservation of the,
snapshot creation
* btrfs: fix error handling in
delete_block_group_cache()
* btrfs: polish names of kmem caches
* btrfs: update last trans if we do not update the inode
* btrfs: fix possible corruption when fsyncing written
prealloced extents
* btrfs: set journal_info in async trans commit worker
* btrfs: fix a bug in parsing return value in logical
resolve
* btrfs: use helper for logical resolve
* btrfs: use larger limit for translation of logical to
inode
* btrfs: use a slab for ordered extents allocation
* btrfs: fix unprotected ->log_batch
* btrfs: output more information when aborting a unused
transaction handle
* btrfs: fix wrong size for the reservation when doing,
file pre-allocation
* btrfs: cleanup for unused ref cache stuff
* btrfs: fix a misplaced address operator in a condition
* btrfs: fix that error value is changed by mistake
* btrfs: fix second lock in btrfs_delete_delayed_items()
* btrfs: increase the size of the free space cache
* btrfs: fix enospc problems when deleting a subvol
* btrfs: fix wrong mtime and ctime when creating
snapshots
* btrfs: fix race in run_clustered_refs
S/390:
* zfcp: remove invalid reference to list iterator
variable (bnc#779461).
* zfcp: Make trace record tags unique
(bnc#780012,LTC#84941).
* zfcp: Do not wakeup while suspended
(bnc#780012,LTC#84816).
* zfcp: restore refcount check on port_remove
(bnc#780012,LTC#84942).
* zfcp: No automatic port_rescan on events
(bnc#780012,LTC#84817).
* dasd: System hang after all channel were lost
(bnc#780012,LTC#85025).
* Added
patches.arch/s390-54-01-hypfs-missing-files.patch to
series.conf. (bnc#769407)
* dasd: set and unset TIMEOUT flag automatically
(bnc#768084).
* kernel: incorrect task size after fork of a 31 bit
process (bnc#772407,LTC#83674).
* patches.arch/s390-55-03-crst-table-downgrade.patch:
Deleted due to 31bit compile error.
ALSA:
* ALSA: hda - Add mic-mute LED control for HP laptop
(bnc#779330).
* ALSA: hda - Add 3stack-automute model to AD1882 codec
(bnc#775373).
Wireless:
* rt2x00: Remove incorrect led blink. (bnc#774902)
* Revert "rt2x00: handle spurious pci interrupts".
(bnc#774902)
* rt2x00: Mark active channels survey data as "in use".
(bnc#774902)
* rt2x00: Convert big if-statements to
switch-statements. (bnc#774902)
* rt2800: zero MAC_SYS_CTRL bits during BBP and MAC
reset. (bnc#774902)
* rt2800lib: fix wrong -128dBm when signal is stronger
than -12dBm. (bnc#774902)
* rt2800: document RF_R03 register bits [7:4].
(bnc#774902)
* rt2x00: Introduce concept of driver data in struct
rt2x00_dev. (bnc#774902)
* rt2x00: Use struct rt2x00_dev driver data in
rt2800{pci,usb}. (bnc#774902)
* rt2x00: fix a possible NULL pointer dereference.
(bnc#774902)
* rt2x00:Add VCO recalibration. (bnc#774902)
* rt2x00:Add RT5372 chipset support. (bnc#774902)
* rt2x00: Set IEEE80211_HW_REPORTS_TX_ACK_STATUS in
rt2800. (bnc#774902)
* rt2800: introduce wpdma_disable function. (bnc#774902)
* rt2800: initialize queues before giving up due to DMA
error. (bnc#774902)
* rt2800: zero registers of unused TX rings.
(bnc#774902)
* wireless: rt2x00: rt2800pci add more RT539x ids.
(bnc#774902)
* rt2x00:Add RT5392 chipset support. (bnc#774902)
*
patches.fixes/0012-rt2x00-Add-RT5372-chipset-support.patch:
Fix typo.
* rt2800: Add documentation on MCU requests.
(bnc#744198)
* rt2800pci: Fix "Error - MCU request failed" during
initialization. (bnc#744198)
Packaging:
* rpm/kernel-binary.spec.in: Temporarily disable
icecream builds until miscompilation is resolved
(bnc#763954 bnc#773831)
* rpm/kernel-binary.spec.in: add Conflicts for older
hyper-v hv_kvp_daemon (bnc#770763) the kernel-user
interface changed, old binaries will busyloop with newer
kernel
* rpm/kernel-binary.spec.in: Do not run debugedit -i,
use eu-unstrip to retrieve the build-id instead
(bnc#768504).
* rpm/kernel-binary.spec.in: Fix Obsoletes: tag for the
SLE11-SP1 realtek-r8192ce_pci-kmp package.
Misc
*
patches.suse/no-partition-scan: Implement
"no_partition_scan" commandline option (FATE#303697).
*
vfs: dcache: use DCACHE_DENTRY_KILLED instead of
DCACHE_DISCONNECTED in d_kill() (bnc#779699).
*
igb: convert to ndo_fix_features (bnc#777269).
*
igb: do vlan cleanup (bnc#777269).
*
tcp: flush DMA queue before sk_wait_data if rcv_wnd
is zero (bnc#777024).
*
drm: Export drm_probe_ddc() (bnc#780461).
* drm/dp: Update DPCD defines (bnc#780461).
* drm/i915/dp: Be smarter about connection sense for
branch devices (bnc#780461).
*
drm/i915/dp: Fetch downstream port info if needed
during DPCD fetch (bnc#780461).
*
md: fix so that GET_ARRAY_INFO and GET_DISK_INFO fail
correctly when array has not "raid_disks" count yet.
*
sched: Fix ancient race in do_exit() (bnc#781018).
* sched: fix divide by zero in
thread_group/task_times() (bnc#761774).
*
sched: fix migration thread runtime bogosity
(bnc#773688, bnc#769251).
*
megaraid_sas: boot hangs up while LD is offline issue
(bnc#698102).
*
memcg: warn on deeper hierarchies with
use_hierarchy==0 (bnc#781134).
*
scsi_dh_alua: Retry the check-condition in case Mode
Parameters Changed (bnc#772473).
* scsi: update scsi.h with SYNCHRONIZE_CACHE_16
(FATE#313550,bnc#769195).
*
sd: Reshuffle init_sd to avoid crash (bnc#776787).
*
st: remove st_mutex (bnc#773007).
*
cifs: Assume passwords are encoded according to
iocharset (try #2) (bnc#731035).
*
drm/fb-helper: delay hotplug handling when partially
bound (bnc#778822).
* drm/fb helper: do not call drm_crtc_helper_set_config
(bnc#778822).
* patches.drivers/drm-Skip-too-big-EDID-extensions:
Delete. Fixed in firmware, so no longer needed (bnc#764900)
*
drm/i915: Fix backlight control for systems which
have bl polarity reversed (bnc #766156).
*
patches.kernel.org/patch-3.0.27-28: Update references
(bnc#770695 CVE-2012-2745).
*
xen/x86-64: fix hypercall page unwind info.
* patches.xen/xen3-patch-3.0.40-41: Linux 3.0.41.
*
Refresh other Xen patches (bnc#776019).
*
e1000e: clear REQ and GNT in EECD (82571 && 82572)
(bnc#762099).
*
bonding: add some slack to arp monitoring time limits
(bnc#776095).
*
patches.arch/x2apic_opt_out.patch: Refresh. bnc#778082
*
x86, mce: Do not call del_timer_sync() in IRQ context
(bnc#776896).
*
cpufreq / ACPI: Fix not loading acpi-cpufreq driver
regression (bnc#766654).
*
ida: Update references (bnc#740291).
*
audit: do not free_chunk() after fsnotify_add_mark()
(bnc#762214).
*
audit: fix refcounting in audit-tree (bnc#762214).
*
mlx4_en: map entire pages to increase throughput.
*
usb: Add support for root hub port status CAS
(bnc#774289).
*
fs,reiserfs: unlock superblock before calling
reiserfs_quota_on_mount() (bnc#772786).
*
reiserfs: fix deadlock with nfs racing on
create/lookup (bnc#762693).
*
NFS: Slow down state manager after an unhandled error
(bnc#774973).
* nfs: increase number of permitted callback
connections (bnc#771706).
*
Freezer / sunrpc / NFS: do not allow TASK_KILLABLE
sleeps to block the freezer (bnc#775182).
*
powerpc/pseries: Support lower minimum entitlement
for virtual processors (bnc#775984).
*
powerpc: Disable /dev/port interface on systems
without an ISA bridge (bnc#754670).
*
ocfs2: Add a missing journal credit in
ocfs2_link_credits() -v2 (bnc#773320).
*
block: do not artificially constrain max_sectors for
stacking drivers (bnc#774073).
*
bnx2x: Clear MDC/MDIO warning message (bnc#769035).
* bnx2x: Fix BCM57810-KR AN speed transition
(bnc#769035).
* bnx2x: Fix BCM57810-KR FC (bnc#769035).
* bnx2x: Fix BCM578x0-SFI pre-emphasis settings
(bnc#769035).
* bnx2x: Fix link issue for BCM8727 boards (bnc#769035).
* bnx2x: PFC fix (bnc#769035).
* bnx2x: fix checksum validation (bnc#769035).
* bnx2x: fix panic when TX ring is full (bnc#769035).
* bnx2x: previous driver unload revised (bnc#769035).
* bnx2x: remove WARN_ON (bnc#769035).
*
bnx2x: update driver version (bnc#769035).
*
xhci: Fix a logical vs bitwise AND bug (bnc#772427).
* xhci: Switch PPT ports to EHCI on shutdown
(bnc#772427).
* xhci: definitions of register definitions to preserve
kABI (bnc#772427).
*
xhci: Introduce a private switchback method to
preserve kABI (bnc#772427).
*
config.conf: Drop reference to a s390 vanilla config
that does not exist.
*
block: eliminate potential for infinite loop in
blkdev_issue_discard (bnc#773319).
*
Fix cosmetic (but worrisome to users) stop class
accounting bug.
*
bluetooth: Another vendor specific ID for BCM20702A0
[0a5c:21f1] (bnc#774612).
*
memcg: further prevent OOM with too many dirty pages
(bnc#763198).
*
patches.fixes/mm-consider-PageReclaim-for-sync-reclaim.patch
: Refresh to match the upstream version.
*
tmpfs: optimize clearing when writing (VM
Performance).
* tmpfs: distribute interleave better across nodes
(bnc#764209).
*
patches.fixes/tmpfs-implement-NUMA-node-interleaving.patch:
dropped in favor of the upstream patch
Security Issue reference:
* CVE-2012-2745
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2745
>
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP2 for VMware:
zypper in -t patch slessp2-kernel-6923 slessp2-kernel-6926
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp2-kernel-6923 slessp2-kernel-6924 slessp2-kernel-6925 slessp2-kernel-6926 slessp2-kernel-6931
- SUSE Linux Enterprise High Availability Extension 11 SP2:
zypper in -t patch sleshasp2-kernel-6923 sleshasp2-kernel-6924 sleshasp2-kernel-6925 sleshasp2-kernel-6926 sleshasp2-kernel-6931
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp2-kernel-6923 sledsp2-kernel-6926
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 3.0.42]:
kernel-default-3.0.42-0.7.3
kernel-default-base-3.0.42-0.7.3
kernel-default-devel-3.0.42-0.7.3
kernel-source-3.0.42-0.7.3
kernel-syms-3.0.42-0.7.3
kernel-trace-3.0.42-0.7.3
kernel-trace-base-3.0.42-0.7.3
kernel-trace-devel-3.0.42-0.7.3
kernel-xen-devel-3.0.42-0.7.3
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586) [New Version: 3.0.42]:
kernel-pae-3.0.42-0.7.3
kernel-pae-base-3.0.42-0.7.3
kernel-pae-devel-3.0.42-0.7.3
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.0.42]:
kernel-default-3.0.42-0.7.3
kernel-default-base-3.0.42-0.7.3
kernel-default-devel-3.0.42-0.7.3
kernel-source-3.0.42-0.7.3
kernel-syms-3.0.42-0.7.3
kernel-trace-3.0.42-0.7.3
kernel-trace-base-3.0.42-0.7.3
kernel-trace-devel-3.0.42-0.7.3
- SUSE Linux Enterprise Server 11 SP2 (i586 x86_64) [New Version: 3.0.42]:
kernel-ec2-3.0.42-0.7.3
kernel-ec2-base-3.0.42-0.7.3
kernel-ec2-devel-3.0.42-0.7.3
kernel-xen-3.0.42-0.7.3
kernel-xen-base-3.0.42-0.7.3
kernel-xen-devel-3.0.42-0.7.3
- SUSE Linux Enterprise Server 11 SP2 (s390x) [New Version: 3.0.42]:
kernel-default-man-3.0.42-0.7.3
- SUSE Linux Enterprise Server 11 SP2 (ppc64) [New Version: 3.0.42]:
kernel-ppc64-3.0.42-0.7.3
kernel-ppc64-base-3.0.42-0.7.3
kernel-ppc64-devel-3.0.42-0.7.3
- SUSE Linux Enterprise Server 11 SP2 (i586) [New Version: 3.0.42]:
kernel-pae-3.0.42-0.7.3
kernel-pae-base-3.0.42-0.7.3
kernel-pae-devel-3.0.42-0.7.3
- SUSE Linux Enterprise High Availability Extension 11 SP2 (i586 ia64 ppc64 s390x x86_64):
cluster-network-kmp-default-1.4_3.0.42_0.7-2.18.7
cluster-network-kmp-trace-1.4_3.0.42_0.7-2.18.7
gfs2-kmp-default-2_3.0.42_0.7-0.7.42
gfs2-kmp-trace-2_3.0.42_0.7-0.7.42
ocfs2-kmp-default-1.6_3.0.42_0.7-0.11.6
ocfs2-kmp-trace-1.6_3.0.42_0.7-0.11.6
- SUSE Linux Enterprise High Availability Extension 11 SP2 (i586 x86_64):
cluster-network-kmp-xen-1.4_3.0.42_0.7-2.18.7
gfs2-kmp-xen-2_3.0.42_0.7-0.7.42
ocfs2-kmp-xen-1.6_3.0.42_0.7-0.11.6
- SUSE Linux Enterprise High Availability Extension 11 SP2 (ppc64):
cluster-network-kmp-ppc64-1.4_3.0.42_0.7-2.18.7
gfs2-kmp-ppc64-2_3.0.42_0.7-0.7.42
ocfs2-kmp-ppc64-1.6_3.0.42_0.7-0.11.6
- SUSE Linux Enterprise High Availability Extension 11 SP2 (i586):
cluster-network-kmp-pae-1.4_3.0.42_0.7-2.18.7
gfs2-kmp-pae-2_3.0.42_0.7-0.7.42
ocfs2-kmp-pae-1.6_3.0.42_0.7-0.11.6
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 3.0.42]:
kernel-default-3.0.42-0.7.3
kernel-default-base-3.0.42-0.7.3
kernel-default-devel-3.0.42-0.7.3
kernel-default-extra-3.0.42-0.7.3
kernel-source-3.0.42-0.7.3
kernel-syms-3.0.42-0.7.3
kernel-trace-3.0.42-0.7.3
kernel-trace-base-3.0.42-0.7.3
kernel-trace-devel-3.0.42-0.7.3
kernel-trace-extra-3.0.42-0.7.3
kernel-xen-3.0.42-0.7.3
kernel-xen-base-3.0.42-0.7.3
kernel-xen-devel-3.0.42-0.7.3
kernel-xen-extra-3.0.42-0.7.3
- SUSE Linux Enterprise Desktop 11 SP2 (i586) [New Version: 3.0.42]:
kernel-pae-3.0.42-0.7.3
kernel-pae-base-3.0.42-0.7.3
kernel-pae-devel-3.0.42-0.7.3
kernel-pae-extra-3.0.42-0.7.3
- SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64):
ext4-writeable-kmp-default-0_3.0.42_0.7-0.14.23
ext4-writeable-kmp-trace-0_3.0.42_0.7-0.14.23
kernel-default-extra-3.0.42-0.7.3
- SLE 11 SERVER Unsupported Extras (i586 x86_64):
ext4-writeable-kmp-xen-0_3.0.42_0.7-0.14.23
kernel-xen-extra-3.0.42-0.7.3
- SLE 11 SERVER Unsupported Extras (ppc64):
ext4-writeable-kmp-ppc64-0_3.0.42_0.7-0.14.23
kernel-ppc64-extra-3.0.42-0.7.3
- SLE 11 SERVER Unsupported Extras (i586):
ext4-writeable-kmp-pae-0_3.0.42_0.7-0.14.23
kernel-pae-extra-3.0.42-0.7.3
References:
http://support.novell.com/security/cve/CVE-2012-2745.html
https://bugzilla.novell.com/698102
https://bugzilla.novell.com/731035
https://bugzilla.novell.com/740291
https://bugzilla.novell.com/744198
https://bugzilla.novell.com/753617
https://bugzilla.novell.com/754670
https://bugzilla.novell.com/761774
https://bugzilla.novell.com/762099
https://bugzilla.novell.com/762214
https://bugzilla.novell.com/762693
https://bugzilla.novell.com/763198
https://bugzilla.novell.com/763954
https://bugzilla.novell.com/764209
https://bugzilla.novell.com/764900
https://bugzilla.novell.com/766156
https://bugzilla.novell.com/766654
https://bugzilla.novell.com/768084
https://bugzilla.novell.com/768504
https://bugzilla.novell.com/769035
https://bugzilla.novell.com/769195
https://bugzilla.novell.com/769251
https://bugzilla.novell.com/769407
https://bugzilla.novell.com/770034
https://bugzilla.novell.com/770695
https://bugzilla.novell.com/770763
https://bugzilla.novell.com/771706
https://bugzilla.novell.com/772407
https://bugzilla.novell.com/772427
https://bugzilla.novell.com/772473
https://bugzilla.novell.com/772786
https://bugzilla.novell.com/772831
https://bugzilla.novell.com/773007
https://bugzilla.novell.com/773319
https://bugzilla.novell.com/773320
https://bugzilla.novell.com/773688
https://bugzilla.novell.com/773831
https://bugzilla.novell.com/774073
https://bugzilla.novell.com/774289
https://bugzilla.novell.com/774612
https://bugzilla.novell.com/774902
https://bugzilla.novell.com/774973
https://bugzilla.novell.com/775182
https://bugzilla.novell.com/775373
https://bugzilla.novell.com/775984
https://bugzilla.novell.com/776019
https://bugzilla.novell.com/776095
https://bugzilla.novell.com/776787
https://bugzilla.novell.com/776896
https://bugzilla.novell.com/777024
https://bugzilla.novell.com/777269
https://bugzilla.novell.com/778082
https://bugzilla.novell.com/778822
https://bugzilla.novell.com/779330
https://bugzilla.novell.com/779461
https://bugzilla.novell.com/779699
https://bugzilla.novell.com/780012
https://bugzilla.novell.com/780461
https://bugzilla.novell.com/781018
https://bugzilla.novell.com/781134
http://download.novell.com/patch/finder/?keywords=093be6c543a0ba2b6ecf2968d4a92212
http://download.novell.com/patch/finder/?keywords=0a2a6cf21f8291011c81928522f1063a
http://download.novell.com/patch/finder/?keywords=2205d86ff343bf4bd4269c0ee1a36fce
http://download.novell.com/patch/finder/?keywords=56bb8b246b094d7b9bb76894fbb7a521
http://download.novell.com/patch/finder/?keywords=89ed32091b7cde5f4b5f62a8d0ae9f0f
http://download.novell.com/patch/finder/?keywords=9bafa94f852e694b59b99001aa47a2b5
http://download.novell.com/patch/finder/?keywords=c29b53bba0dc375ee51121e1a1619e8d
http://download.novell.com/patch/finder/?keywords=d3169be940573b6d9ace41778ad0a84c
http://download.novell.com/patch/finder/?keywords=d62b0fd1b9b16f9da1561454d3ac760d
http://download.novell.com/patch/finder/?keywords=f6f94ee4ea8bc5fdac3a7d71f4d55ed9
More information about the sle-security-updates
mailing list