From sle-security-updates at lists.suse.com Thu May 2 14:04:22 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 2 May 2013 22:04:22 +0200 (CEST) Subject: SUSE-SU-2013:0743-1: moderate: Security update for libxml2 Message-ID: <20130502200422.8E59C32265@maintenance.suse.de> SUSE Security Update: Security update for libxml2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0743-1 Rating: moderate References: #793334 #805233 Cross-References: CVE-2013-0338 CVE-2013-0339 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware LTSS SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: libxml2 has been updated to fix two security bugs. * CVE-2013-0338: Internal entity expansion within XML was not bounded, leading to simple small XML files being able to cause "out of memory" denial of service conditions. * CVE-2012-5134: Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document. Security Issue references: * CVE-2013-0338 * CVE-2013-0339 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware LTSS: zypper in -t patch slessp1-libxml2-7630 - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-libxml2-7630 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware LTSS (i586 x86_64): libxml2-2.7.6-0.23.1 libxml2-doc-2.7.6-0.23.1 libxml2-python-2.7.6-0.23.1 - SUSE Linux Enterprise Server 11 SP1 for VMware LTSS (x86_64): libxml2-32bit-2.7.6-0.23.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64): libxml2-2.7.6-0.23.1 libxml2-doc-2.7.6-0.23.1 libxml2-python-2.7.6-0.23.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64): libxml2-32bit-2.7.6-0.23.1 References: http://support.novell.com/security/cve/CVE-2013-0338.html http://support.novell.com/security/cve/CVE-2013-0339.html https://bugzilla.novell.com/793334 https://bugzilla.novell.com/805233 http://download.novell.com/patch/finder/?keywords=5dbce996d303d7d2a22bcc3cc845f1ea From sle-security-updates at lists.suse.com Thu May 2 15:04:26 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 2 May 2013 23:04:26 +0200 (CEST) Subject: SUSE-SU-2013:0744-1: moderate: Security update for libxml2 Message-ID: <20130502210426.CED2A32265@maintenance.suse.de> SUSE Security Update: Security update for libxml2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0744-1 Rating: moderate References: #805233 Cross-References: CVE-2013-0338 CVE-2013-0339 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: libxml2 has been updated to fix entity expansion problems: * CVE-2013-0338: Internal entity expansion within XML was not bounded, leading to simple small XML files being able to cause "out of memory" denial of service conditions. Security Issue references: * CVE-2013-0338 * CVE-2013-0339 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-libxml2-7517 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-libxml2-7517 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-libxml2-7517 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-libxml2-7517 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libxml2-devel-2.7.6-0.23.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64): libxml2-devel-32bit-2.7.6-0.23.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): libxml2-2.7.6-0.23.1 libxml2-doc-2.7.6-0.23.1 libxml2-python-2.7.6-0.23.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): libxml2-32bit-2.7.6-0.23.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): libxml2-2.7.6-0.23.1 libxml2-doc-2.7.6-0.23.1 libxml2-python-2.7.6-0.23.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libxml2-32bit-2.7.6-0.23.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): libxml2-x86-2.7.6-0.23.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): libxml2-2.6.23-15.37.1 libxml2-devel-2.6.23-15.37.1 libxml2-python-2.6.23-15.37.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): libxml2-32bit-2.6.23-15.37.1 libxml2-devel-32bit-2.6.23-15.37.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): libxml2-x86-2.6.23-15.37.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): libxml2-64bit-2.6.23-15.37.1 libxml2-devel-64bit-2.6.23-15.37.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): libxml2-2.7.6-0.23.1 libxml2-python-2.7.6-0.23.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libxml2-32bit-2.7.6-0.23.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): libxml2-2.6.23-15.37.1 libxml2-devel-2.6.23-15.37.1 libxml2-python-2.6.23-15.37.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): libxml2-32bit-2.6.23-15.37.1 libxml2-devel-32bit-2.6.23-15.37.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): libxml2-test-2.6.23-15.37.1 References: http://support.novell.com/security/cve/CVE-2013-0338.html http://support.novell.com/security/cve/CVE-2013-0339.html https://bugzilla.novell.com/805233 http://download.novell.com/patch/finder/?keywords=dfd9d469ee1615731b1403a0c070bfa5 http://download.novell.com/patch/finder/?keywords=f2f3f25cb4786580570e533ba525fef0 From sle-security-updates at lists.suse.com Tue May 7 11:04:33 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 7 May 2013 19:04:33 +0200 (CEST) Subject: SUSE-SU-2013:0756-1: Security update for ImageMagick Message-ID: <20130507170433.CC23C32269@maintenance.suse.de> SUSE Security Update: Security update for ImageMagick ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0756-1 Rating: low References: #773612 Affected Products: SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: ImageMagick has been updated to fix an integer overflow (CVE-2012-3438). Package List: - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): ImageMagick-6.2.5-16.36.2 ImageMagick-Magick++-6.2.5-16.36.2 ImageMagick-devel-6.2.5-16.36.2 perl-PerlMagick-6.2.5-16.36.2 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): ImageMagick-6.2.5-16.36.2 ImageMagick-Magick++-6.2.5-16.36.2 ImageMagick-Magick++-devel-6.2.5-16.36.2 ImageMagick-devel-6.2.5-16.36.2 perl-PerlMagick-6.2.5-16.36.2 References: https://bugzilla.novell.com/773612 http://download.novell.com/patch/finder/?keywords=197e00af8ca9eee4ffb65e54b040e40d From sle-security-updates at lists.suse.com Tue May 7 12:04:23 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 7 May 2013 20:04:23 +0200 (CEST) Subject: SUSE-SU-2013:0757-1: Security update for ImageMagick Message-ID: <20130507180423.98E8232266@maintenance.suse.de> SUSE Security Update: Security update for ImageMagick ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0757-1 Rating: low References: #754481 #773612 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: ImageMagick has been updated to fix an integer overflow (CVE-2012-3438). Also a slowness in "convert" when resizing JPEG images has been addressed (bnc#754481). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-ImageMagick-7520 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-ImageMagick-7520 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-ImageMagick-7520 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-ImageMagick-7520 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): ImageMagick-6.4.3.6-7.26.1 ImageMagick-devel-6.4.3.6-7.26.1 libMagick++-devel-6.4.3.6-7.26.1 libMagick++1-6.4.3.6-7.26.1 libMagickWand1-6.4.3.6-7.26.1 perl-PerlMagick-6.4.3.6-7.26.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64): libMagickWand1-32bit-6.4.3.6-7.26.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): libMagickCore1-6.4.3.6-7.26.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): libMagickCore1-32bit-6.4.3.6-7.26.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): libMagickCore1-6.4.3.6-7.26.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libMagickCore1-32bit-6.4.3.6-7.26.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): ImageMagick-6.4.3.6-7.26.1 libMagick++1-6.4.3.6-7.26.1 libMagickCore1-6.4.3.6-7.26.1 libMagickWand1-6.4.3.6-7.26.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libMagickCore1-32bit-6.4.3.6-7.26.1 References: https://bugzilla.novell.com/754481 https://bugzilla.novell.com/773612 http://download.novell.com/patch/finder/?keywords=c0709dc8dc314188fc082405043314d3 From sle-security-updates at lists.suse.com Tue May 7 13:04:26 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 7 May 2013 21:04:26 +0200 (CEST) Subject: SUSE-SU-2013:0759-1: important: Security update for Linux kernel Message-ID: <20130507190426.B14A332261@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0759-1 Rating: important References: #578046 #651219 #714604 #722398 #730117 #736149 #738210 #744692 #753371 #754583 #754898 #758040 #758243 #761849 #762424 #763494 #767612 #768052 #773577 #776787 #777616 #777746 #779577 #780977 #786150 #786814 #786900 #787821 #788826 #789235 #789311 #789359 #790867 #792674 #792793 #793139 #793671 #794513 #794529 #794805 #795269 #795928 #795957 #795961 #796412 #796418 #796823 #797042 #797175 #798921 #799197 #799209 #799270 #799275 #799578 #799926 #800280 #800701 #801038 #801178 #801713 #801717 #801720 #801782 #802153 #802353 #802445 #802642 #802712 #803056 #803067 #803394 #803674 #803712 #804154 #804220 #804609 #804656 #805227 #805823 #806138 #806238 #806395 #806404 #806431 #806466 #806469 #806492 #806631 #806825 #806847 #806908 #806976 #806980 #807431 #807517 #807560 #807853 #808166 #808307 #808358 #808827 #808829 #808966 #808991 #809155 #809166 #809375 #809493 #809748 #809902 #809903 #810473 #812281 #812315 #813963 #816443 Cross-References: CVE-2012-2137 CVE-2012-6548 CVE-2012-6549 CVE-2013-0160 CVE-2013-0216 CVE-2013-0231 CVE-2013-0268 CVE-2013-0311 CVE-2013-0349 CVE-2013-0913 CVE-2013-0914 CVE-2013-1767 CVE-2013-1772 CVE-2013-1774 CVE-2013-1792 CVE-2013-1796 CVE-2013-1797 CVE-2013-1798 CVE-2013-1848 CVE-2013-1860 CVE-2013-2634 CVE-2013-2635 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise High Availability Extension 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 SLE 11 SERVER Unsupported Extras ______________________________________________________________________________ An update that solves 22 vulnerabilities and has 95 fixes is now available. It includes one version update. Description: The SUSE Linux Enterprise 11 SP2 kernel has been updated to 3.0.74 fix various security issues and bugs: This update brings some features: * Updated HD-audio drivers for Nvidia/AMD HDMI and Haswell audio (FATE#314311 FATE#313695) * Lustre enablement patches were added (FATE#314679). * SGI UV (Ultraviolet) platform support. (FATE#306952) Security issues fixed in this update: * CVE-2013-0349: The hidp_setup_hid function in net/bluetooth/hidp/core.c in the Linux kernel did not properly copy a certain name field, which allowed local users to obtain sensitive information from kernel memory by setting a long name and making an HIDPCONNADD ioctl call. * CVE-2012-2137: Buffer overflow in virt/kvm/irq_comm.c in the KVM subsystem in the Linux kernel allowed local users to cause a denial of service (crash) and to possibly execute arbitrary code via vectors related to Message Signaled Interrupts (MSI), irq routing entries, and an incorrect check by the setup_routing_entry function before invoking the kvm_set_irq function. * CVE-2012-6549: The isofs_export_encode_fh function in fs/isofs/export.c in the Linux kernel did not initialize a certain structure member, which allowed local users to obtain sensitive information from kernel heap memory via a crafted application. * CVE-2012-6548: The udf_encode_fh function in fs/udf/namei.c in the Linux kernel did not initialize a certain structure member, which allowed local users to obtain sensitive information from kernel heap memory via a crafted application. * CVE-2013-0160: Timing side channel on attacks were possible on /dev/ptmx that could allow local attackers to predict keypresses like e.g. passwords. This has been fixed by not updating accessed/modified time on the pty devices. Note that this might break pty idle detection, so it might get reverted again. * CVE-2013-0216: The Xen netback functionality in the Linux kernel allowed guest OS users to cause a denial of service (loop) by triggering ring pointer corruption. * CVE-2013-0231: The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux allowed guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. * CVE-2013-0311: The translate_desc function in drivers/vhost/vhost.c in the Linux kernel did not properly handle cross-region descriptors, which allowed guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges. * CVE-2013-0913: Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel allowed local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition. * CVE-2013-0914: The flush_signal_handlers function in kernel/signal.c in the Linux kernel preserved the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application containing a sigaction system call. * CVE-2013-1767: Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel allowed local users to gain privileges or to cause a denial of service (system crash) by remounting a tmpfs filesystem without specifying a required mpol (aka mempolicy) mount option. * CVE-2013-1772: The log_prefix function in kernel/printk.c in the Linux kernel 3.x did not properly remove a prefix string from a syslog header, which allowed local users to cause a denial of service (buffer overflow and system crash) by leveraging /dev/kmsg write access and triggering a call_console_drivers function call. * CVE-2013-1774: The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) via an attempted /dev/ttyUSB read or write operation on a disconnected Edgeport USB serial converter. * CVE-2013-1792: Race condition in the install_user_keyrings function in security/keys/process_keys.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) via crafted keyctl system calls that trigger keyring operations in simultaneous threads. * CVE-2013-1796: The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel did not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allowed guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application. * CVE-2013-1797: Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel allowed guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation. * CVE-2013-1798: The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel did not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application. * CVE-2013-1848: fs/ext3/super.c in the Linux kernel used incorrect arguments to functions in certain circumstances related to printk input, which allowed local users to conduct format-string attacks and possibly gain privileges via a crafted application. * CVE-2013-1860: Heap-based buffer overflow in the wdm_in_callback function in drivers/usb/class/cdc-wdm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or to possibly execute arbitrary code via a crafted cdc-wdm USB device. * CVE-2013-2634: net/dcb/dcbnl.c in the Linux kernel did not initialize certain structures, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application. * CVE-2013-2635: The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain structure member, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application. * CVE-2013-0268: The msr_open function in arch/x86/kernel/msr.c in the Linux kernel allowed local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c. Bugs fixed in this update: BTRFS: * btrfs: do not try to notify udev about missing devices. * btrfs: add cancellation points to defrag. * btrfs: define BTRFS_MAGIC as a u64 value. * btrfs: make sure NODATACOW also gets NODATASUM set. * btrfs: enforce min_bytes parameter during extent allocation. * btrfs: build up error handling for merge_reloc_roots. * btrfs: free all recorded tree blocks on error . * btrfs: do not BUG_ON in prepare_to_reloc . * btrfs: do not BUG_ON on aborted situation . * btrfs: handle a bogus chunk tree nicely . * btrfs: do not drop path when printing out tree errors in scrub . * btrfs: make subvol creation/deletion killable in the early stages. * btrfs: abort unlink trans in missed error case. * btrfs: fix reada debug code compilation. * btrfs: return error when we specify wrong start to defrag. * btrfs: do not force pages under writeback to finish when aborting. USB: * USB: move usb_translate_errors to 1/usb (bnc#806908). * USB: add EOPNOTSUPP to usb_translate_errors (bnc#806908). * USB: cdc-wdm: sanitize error returns (bnc#806908). * USB: cdc-wdm: cleanup error codes (bnc#806908). * USB: cdc-wdm: add helper to preserve kABI (bnc#806908). * USB: Do not use EHCI port sempahore for USB 3.0 hubs (bnc#807560). * USB: Prepare for refactoring by adding extra udev checks (bnc#807560). * USB: Rip out recursive call on warm port reset (bnc#807560). * USB: Fix connected device switch to Inactive state (bnc#807560). * USB: modify hub to detect unplugs in all states (bnc#807560). * USB: io_ti: Fix NULL dereference in chase_port() (bnc#806976, CVE-2013-1774). * USB: cdc-wdm: fix buffer overflow (bnc#806431). * USB: cdc-wdm: cannot use dev_printk when device is gone (bnc#806469). * USB: cdc-wdm: fix memory leak (bnc#806466). * elousb: really long delays for broken devices (bnc#795269). * xhci: Fix conditional check in bandwidth calculation (bnc#795961). * xHCI: Fix TD Size calculation on 1.0 hosts (bnc#795957). * xhci: avoid dead ports, add roothub port polling (bnc#799197). * USB: Handle warm reset failure on empty port (bnc#799926). * USB: Ignore port state until reset completes (bnc#799926). * Allow USB 3.0 ports to be disabled (bnc#799926). * USB: Ignore xHCI Reset Device status (bnc#799926). * USB: Handle auto-transition from hot to warm reset (bnc#799926). S/390: * ipl: Implement diag308 loop for zfcpdump (bnc#801720, LTC#88197). * zcore: Add hsa file (bnc#801720, LTC#88198). * kernel: support physical memory > 4TB (bnc#801720, LTC#88787). * mm: Fix crst upgrade of mmap with MAP_FIXED (bnc#801720, LTC#88797). * Update patches.suse/zcrypt-feed-hwrandom (bnc#806825). Allow zcrypt module unload even when the thread is blocked writing to a full random pool. * dca: check against empty dca_domains list before unregister provider fix. * s390/kvm: Fix store status for ACRS/FPRS fix. * series.conf: disabled patches.arch/s390-64-03-kernel-inc-phys-mem.patch due to excessive kabi break. (bnc#801720) ALSA: * patches.drivers/alsa-sp3-pre-695-Yet-another-fix-for-broken- HSW-HDMI-pin: Refresh. Fix the invalid PCI SSID check (bnc#806404) * ALSA: hda - Support mute LED on HP AiO buttons (bnc#808991). * ALSA: hda: Allow multple SPDIF controls per codec (bnc#780977). * ALSA: hda: Virtualize SPDIF out controls (bnc#780977). * ALSA: hda: Separate generic and non-generic implementations. * ALSA: hda: hdmi_eld_update_pcm_info: update a stream in place. * ALSA: hda: HDMI: Support codecs with fewer cvts than pins. * ALSA: hda - Add snd_hda_get_conn_list() helper function. * ALSA: hda - Add snd_hda_override_conn_list() helper function. * ALSA: hda - Increase the max number of coverters/pins in patch_hdmi.c (bnc#780977). * ALSA: hda - Check non-snoop in a single place (bnc#801713). * ALSA: HDA: Use LPIB Position fix for Intel SCH Poulsbo (bnc#801713). * ALSA: hda_intel: Add Oaktrail identifiers (bnc#801713). * ALSA: HDA: Use LPIB position fix for Oaktrail (bnc#801713). * ALSA: hda - add id for Atom Cedar Trail HDMI codec (bnc#801713). * ALSA: hda - Fix detection of Creative SoundCore3D controllers (bnc#762424). * ALSA: hda - add power states information in proc (bnc#801713). * ALSA: hda - Show D3cold state in proc files (bnc#801713). * ALSA: hda - check supported power states (bnc#801713). * ALSA: hda - reduce msleep time if EPSS power states supported (bnc#801713). * ALSA: hda - check proper return value (bnc#801713). * ALSA: hda - power setting error check (bnc#801713). * ALSA: hda - Add DeviceID for Haswell HDA (bnc#801713). * ALSA: hda - add Haswell HDMI codec id (bnc#801713). * ALSA: hda - Fix driver type of Haswell controller to AZX_DRIVER_SCH. * ALSA: hda - Add new GPU codec ID to snd-hda (bnc#780977). * ALSA: HDMI - Fix channel_allocation array wrong order (bnc#801713). * ALSA: hda - Avoid BDL position workaround when no_period_wakeup is set (bnc#801713). * ALSA: hda - Allow to pass position_fix=0 explicitly (bnc#801713). * ALSA: hda - Add another pci id for Haswell board. * ALSA: hda - force use of SSYNC bits (bnc#801713). * ALSA: hda - use LPIB for delay estimation (bnc#801713). * ALSA: hda - add PCI identifier for Intel 5 Series/3400 (bnc#801713). * ALSA: hda - Add workaround for conflicting IEC958 controls (FATE#314311). * ALSA: hda - Stop LPIB delay counting on broken hardware (FATE#313695). * ALSA: hda - Always turn on pins for HDMI/DP (FATE#313695). * ALSA: hda - bug fix for invalid connection list of Haswell HDMI codec pins (FATE#313695). * ALSA - HDA: New PCI ID for Haswell ULT (bnc#801713). * ALSA: hda - Release assigned pin/cvt at error path of hdmi_pcm_open() (bnc#801713). * ALSA: hda - Support rereading widgets under the function group (bnc#801713). * ALSA: hda - Add fixup for Haswell to enable all pin and convertor widgets (bnc#801713). * ALSA: hda - Yet another fix for broken HSW HDMI pin connections (bnc#801713). * patches.kabi/alsa-spdif-update-kabi-fixes: Fix kABI breakage due to HD-audio HDMI updates (bnc#780977). * ALSA: hda - Fix non-snoop page handling (bnc#800701). * ALSA: hda - Apply mic-mute LED fixup for new HP laptops (bnc#796418). * patches.drivers/alsa-sp3-pre-695-Yet-another-fix-for-broken- HSW-HDMI-pin: Refresh. Fix a superfluous incremental leading to the double array size (bnc#808966) XEN: * pciback: notify hypervisor about devices intended to be assigned to guests. * patches.xen/xen-clockevents: Update (bnc#803712). * patches.xen/xen-ipi-per-cpu-irq: Update (bnc#803712). * patches.xen/xen3-patch-2.6.19: Update (bnc#809166). * Update Xen patches to 3.0.68. * Update Xen patches to 3.0.63. * netback: fix netbk_count_requests(). * x86/mm: Check if PUD is large when validating a kerneladdress (bnc#794805). OTHER: * Revert dmi_scan: fix missing check for _DMI_ signature in smbios_present(). * Revert drivers/firmware/dmi_scan.c: fetch dmi version from SMBIOS if it exists. * Revert drivers/firmware/dmi_scan.c: check dmi version when get system uuid. * sysfs: Revert sysfs: fix race between readdir and lseek (bnc#816443). * 8021q: Revert 8021q: fix a potential use-after-free. * /dev/urandom returning EOF: trim down revert to not change kabi. (bnc#789359). * tun: reserves space for network in skb (bnc#803394). * Fixed /dev/urandom returning EOF (bnc#789359). * mm: Make snapshotting pages for stable writes a per-bio operation * fs: Only enable stable page writes when necessary (bnc#807517). * patches.drivers/ixgbe-Address-fact-that-RSC-was-not-setting- GSO-size.patch: Fix bnc#802712 * Fix build error without CONFIG_BOOTSPLASH * Fix bootsplash breakage due to 3.0.67 stable fix (bnc#813963) * drivers/base/memory.c: fix memory_dev_init() long delay (bnc#804609). * mtd: drop physmap_configure (bnc#809375). * Bluetooth: btusb: hide more usb_submit_urb errors (bnc#812281). * o2dlm: fix NULL pointer dereference in o2dlm_blocking_ast_wrapper (bnc#806492) * qeth: fix qeth_wait_for_threads() deadlock for OSN devices (bnc#812315, LTC#90910). * Fix NULL pointer dereference in o2dlm_blocking_ast_wrapper (bnc#806492) * mm: fix ALLOC_WMARK_MASK check (bnc#808166) * pciehp: Fix dmi match table definition and missing space in printk (bnc#796412). * fnic: Fix SGEs limit (bnc#807431). * pciehp: Ignore missing surprise bit on some hosts (bnc#796412). * ipv6: Queue fragments per interface for multicast/link-local addresses (bnc#804220). * netfilter: send ICMPv6 message on fragment reassembly timeout (bnc#773577). * netfilter: fix sending ICMPv6 on netfilter reassembly timeout (bnc#773577). * jbd: clear revoked flag on buffers before a new transaction started (bnc#806395). * xfrm6: count extension headers into payload length (bnc#794513). * mm: page_alloc: Avoid marking zones full prematurely after zone_reclaim() (Evict inactive pages when zone_reclaim is enabled (bnc#808166)). * st: Take additional queue ref in st_probe (bnc#801038, bnc#788826). * drivers: xhci: fix incorrect bit test (bnc#714604). * xfrm: remove unused xfrm4_policy_fini() (bnc#801717). * xfrm: make gc_thresh configurable in all namespaces (bnc#801717). * kabi: use net_generic to avoid changes in struct net (bnc#801717). * xfs: Fix WARN_ON(delalloc) in xfs_vm_releasepage() (bnc#806631). * patches.drivers/alsa-sp2-hda-033-Support-mute-LED-on-HP-AiO- buttons: Refresh tags. * block: use i_size_write() in bd_set_size() (bnc#809748). * loopdev: fix a deadlock (bnc#809748). * patches.suse/supported-flag: fix mis-reported supported status (bnc#809493). * patches.suse/supported-flag-enterprise: Refresh. * KVM: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache_init (bnc#806980 CVE-2013-1797). * KVM: Fix bounds checking in ioapic indirect register read (bnc#806980 CVE-2013-1798). * KVM: Fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (bnc#806980 CVE-2013-1796). * KVM: introduce kvm_read_guest_cached (bnc#806980). * x86/numa: Add constraints check for nid parameters (Cope with negative SRAT distances (bnc#807853)). * drm/i915: Periodically sanity check power management (bnc#808307). * drm/i915: bounds check execbuffer relocation count (bnc#808829,CVE-2013-0913). * ext3: Fix format string issues (bnc#809155, CVE-2013-1848). * x86-64: Fix memset() to support sizes of 4Gb and above (Properly initialise memmap on large machines (bnc#802353)). * bdi: allow block devices to say that they require stable page writes * mm: only enforce stable page writes if the backing device requires it * block: optionally snapshot page contents to provide stable pages during write * 9pfs: fix filesystem to wait for stable page writeback * ocfs2: wait for page writeback to provide stable pages * ubifs: wait for page writeback to provide stable pages * Only enable stable page writes when required by underlying BDI (bnc#807517). * KVM: emulator: drop RPL check from linearize() function (bnc#754583). * mlx4: Correct calls to to_ib_ah_attr() (bnc#806847). * DRM/i915: On G45 enable cursor plane briefly after enabling the display plane (bnc #753371) [backported from drm-intel-fixes]. * cxgb4i: Remove the scsi host device when removing device (bnc#722398) * xprtrdma: The transport should not bug-check when a dup reply is received (bnc#763494). * tmpfs: fix use-after-free of mempolicy object (bnc#806138, CVE-2013-1767). * lpfc: Check fc_block_scsi_eh return value correctly for lpfc_abort_handler (bnc#803674). * md: fix bug in handling of new_data_offset (bnc#805823). * md: Avoid OOPS when reshaping raid1 to raid0 (Useful OOPS fix). * md: fix two bugs when attempting to resize RAID0 array (Useful BUG() fix). * md: raid0: fix error return from create_stripe_zones (useful bug fix). * ext4: add missing kfree() on error return path in add_new_gdb(). * ext4: Free resources in some error path in ext4_fill_super. * intel_idle: support Haswell (fate#313720). * hp_accel: Add a new PnP ID HPQ6007 for new HP laptops (bnc#802445). * nfs: Ensure NFS does not block on dead server during unmount (bnc#794529). * block: disable discard request merge temporarily (bnc#803067). * mm: mmu_notifier: have mmu_notifiers use a global SRCU so they may safely schedule * mm: mmu_notifier: make the mmu_notifier srcu static * mmu_notifier_unregister NULL Pointer deref and multiple ->release() callouts * Have mmu_notifiers use SRCU so they may safely schedule kabi compatability * patches.fixes/Have-mmu_notifiers-use-SRCU-so-they-may-safely -schedule.patch: * patches.fixes/Have-mmu_notifiers-use-SRCU-so-they-may-safely -schedule-build-fix.patch: Delete, replace with upstream equivalent and add KABI workaround (bnc#578046, bnc#786814, FATE#306952). * ipv6: Do not send packet to big messages to self (bnc#786150). * hpwdt: Unregister NMI events on exit (bnc#777746). * x86/mm: Check if PUD is large when validating a kernel address (bnc#794805). * ata: Fix DVD not dectected at some Haswell platforms (bnc#792674). * Avoid softlockups in printk (bnc#744692, bnc#789311). * Do not pack credentials for dying processes (bnc#779577, bnc#803056). * xfs: punch new delalloc blocks out of failed writes inside EOF (bnc#761849). * xfs: xfs_sync_data is redundant (bnc#761849). * Add GPIO support for Intel Centerton SOC (bnc#792793). * Add Multifunction Device support for Intel Centerton SOC (bnc#792793). * Add Intel Legacy Block support for Intel Centerton SOC (bnc#792793). * mm: net: Allow some !SOCK_MEMALLOC traffic through even if skb_pfmemalloc (Allow GPFS network traffic despite PF_MEMALLOC misuse (bnc#786900)). * kernel/resource.c: fix stack overflow in __reserve_region_with_split() (bnc#801782). * Lustre enablement patches * block: add dev_check_rdonly and friends for Lustre testing (FATE#314679). * dcache: Add DCACHE_LUSTRE_INVALID flag for Lustre to handle its own invalidation (FATE#314679). * lsm: export security_inode_unlink (FATE#315679). * lustre: Add lustre kernel version (FATE#314679). * st: fix memory leak with >1MB tape I/O (bnc#798921). * cifs: lower default wsize when 1 extensions are not used (bnc#799578). * ata_generic: Skip is_intel_ider() check when ata_generic=1 is set (bnc#777616). * quota: autoload the quota_v2 module for QFMT_VFS_V1 quota format (bnc#802153). * xen: properly bound buffer access when parsing cpu/availability. * netback: shutdown the ring if it contains garbage (CVE-2013-0216 XSA-39 bnc#800280). * netback: correct netbk_tx_err() to handle wrap around (CVE-2013-0216 XSA-39 bnc#800280). * pciback: rate limit error message from pciback_enable_msi() (CVE-2013-0231 XSA-43 bnc#801178). * scsiback/usbback: move cond_resched() invocations to proper place. * drm/i915: Implement workaround for broken CS tlb on i830/845 (bnc #758040). * drivers: scsi: storvsc: Initialize the sglist. * e1000e: 82571 Fix Tx Data Corruption during Tx hang recovery (bnc#790867). * KVM: Fix buffer overflow in kvm_set_irq() (bnc#767612 CVE-2012-2137). * mm: compaction: Abort async compaction if locks are contended or taking too long. * mm: compaction: abort compaction loop if lock is contended or run too long. * mm: compaction: acquire the zone->lock as late as possible. * mm: compaction: acquire the zone->lru_lock as late as possible. * mm: compaction: move fatal signal check out of compact_checklock_irqsave. Reduce LRU and zone lock contention when compacting memory for THP (bnc#796823). Security Issue references: * CVE-2012-6548 * CVE-2012-6549 * CVE-2012-2137 * CVE-2013-0160 * CVE-2013-0216 * CVE-2013-0231 * CVE-2013-0913 * CVE-2013-0914 * CVE-2013-1767 * CVE-2013-1774 * CVE-2013-1796 * CVE-2013-1797 * CVE-2013-1798 * CVE-2013-1848 * CVE-2013-1860 * CVE-2013-2634 * CVE-2013-2635 * CVE-2013-1792 * CVE-2013-0311 * CVE-2013-1772 * CVE-2013-0268 * CVE-2013-0349 Indications: Everyone using the Linux Kernel on s390x architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-kernel-7667 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-kernel-7667 slessp2-kernel-7668 slessp2-kernel-7669 slessp2-kernel-7679 - SUSE Linux Enterprise High Availability Extension 11 SP2: zypper in -t patch sleshasp2-kernel-7667 sleshasp2-kernel-7668 sleshasp2-kernel-7669 sleshasp2-kernel-7679 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-kernel-7667 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (i586) [New Version: 3.0.74]: kernel-default-3.0.74-0.6.6.2 kernel-default-base-3.0.74-0.6.6.2 kernel-default-devel-3.0.74-0.6.6.2 kernel-pae-3.0.74-0.6.6.2 kernel-pae-base-3.0.74-0.6.6.2 kernel-pae-devel-3.0.74-0.6.6.2 kernel-source-3.0.74-0.6.6.2 kernel-syms-3.0.74-0.6.6.2 kernel-trace-3.0.74-0.6.6.2 kernel-trace-base-3.0.74-0.6.6.2 kernel-trace-devel-3.0.74-0.6.6.2 kernel-xen-devel-3.0.74-0.6.6.2 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x) [New Version: 3.0.74]: kernel-default-3.0.74-0.6.6.2 kernel-default-base-3.0.74-0.6.6.2 kernel-default-devel-3.0.74-0.6.6.2 kernel-source-3.0.74-0.6.6.2 kernel-syms-3.0.74-0.6.6.2 kernel-trace-3.0.74-0.6.6.2 kernel-trace-base-3.0.74-0.6.6.2 kernel-trace-devel-3.0.74-0.6.6.2 - SUSE Linux Enterprise Server 11 SP2 (s390x) [New Version: 3.0.74]: kernel-default-man-3.0.74-0.6.6.2 - SUSE Linux Enterprise Server 11 SP2 (ppc64) [New Version: 3.0.74]: kernel-ppc64-3.0.74-0.6.6.2 kernel-ppc64-base-3.0.74-0.6.6.2 kernel-ppc64-devel-3.0.74-0.6.6.2 - SUSE Linux Enterprise Server 11 SP2 (i586) [New Version: 3.0.74]: kernel-ec2-3.0.74-0.6.6.2 kernel-ec2-base-3.0.74-0.6.6.2 kernel-ec2-devel-3.0.74-0.6.6.2 kernel-pae-3.0.74-0.6.6.2 kernel-pae-base-3.0.74-0.6.6.2 kernel-pae-devel-3.0.74-0.6.6.2 kernel-xen-3.0.74-0.6.6.2 kernel-xen-base-3.0.74-0.6.6.2 kernel-xen-devel-3.0.74-0.6.6.2 - SUSE Linux Enterprise High Availability Extension 11 SP2 (i586 ia64 ppc64 s390x): cluster-network-kmp-default-1.4_3.0.74_0.6.6-2.18.36 cluster-network-kmp-trace-1.4_3.0.74_0.6.6-2.18.36 gfs2-kmp-default-2_3.0.74_0.6.6-0.7.69 gfs2-kmp-trace-2_3.0.74_0.6.6-0.7.69 ocfs2-kmp-default-1.6_3.0.74_0.6.6-0.11.35 ocfs2-kmp-trace-1.6_3.0.74_0.6.6-0.11.35 - SUSE Linux Enterprise High Availability Extension 11 SP2 (ppc64): cluster-network-kmp-ppc64-1.4_3.0.74_0.6.6-2.18.36 gfs2-kmp-ppc64-2_3.0.74_0.6.6-0.7.69 ocfs2-kmp-ppc64-1.6_3.0.74_0.6.6-0.11.35 - SUSE Linux Enterprise High Availability Extension 11 SP2 (i586): cluster-network-kmp-pae-1.4_3.0.74_0.6.6-2.18.36 cluster-network-kmp-xen-1.4_3.0.74_0.6.6-2.18.36 gfs2-kmp-pae-2_3.0.74_0.6.6-0.7.69 gfs2-kmp-xen-2_3.0.74_0.6.6-0.7.69 ocfs2-kmp-pae-1.6_3.0.74_0.6.6-0.11.35 ocfs2-kmp-xen-1.6_3.0.74_0.6.6-0.11.35 - SUSE Linux Enterprise Desktop 11 SP2 (i586) [New Version: 3.0.74]: kernel-default-3.0.74-0.6.6.2 kernel-default-base-3.0.74-0.6.6.2 kernel-default-devel-3.0.74-0.6.6.2 kernel-default-extra-3.0.74-0.6.6.2 kernel-pae-3.0.74-0.6.6.2 kernel-pae-base-3.0.74-0.6.6.2 kernel-pae-devel-3.0.74-0.6.6.2 kernel-pae-extra-3.0.74-0.6.6.2 kernel-source-3.0.74-0.6.6.2 kernel-syms-3.0.74-0.6.6.2 kernel-trace-3.0.74-0.6.6.2 kernel-trace-base-3.0.74-0.6.6.2 kernel-trace-devel-3.0.74-0.6.6.2 kernel-trace-extra-3.0.74-0.6.6.2 kernel-xen-3.0.74-0.6.6.2 kernel-xen-base-3.0.74-0.6.6.2 kernel-xen-devel-3.0.74-0.6.6.2 kernel-xen-extra-3.0.74-0.6.6.2 - SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64): ext4-writeable-kmp-default-0_3.0.74_0.6.6-0.14.50 ext4-writeable-kmp-trace-0_3.0.74_0.6.6-0.14.50 kernel-default-extra-3.0.74-0.6.6.2 - SLE 11 SERVER Unsupported Extras (i586 x86_64): ext4-writeable-kmp-xen-0_3.0.74_0.6.6-0.14.50 kernel-xen-extra-3.0.74-0.6.6.2 - SLE 11 SERVER Unsupported Extras (ppc64): ext4-writeable-kmp-ppc64-0_3.0.74_0.6.6-0.14.50 kernel-ppc64-extra-3.0.74-0.6.6.2 - SLE 11 SERVER Unsupported Extras (i586): ext4-writeable-kmp-pae-0_3.0.74_0.6.6-0.14.50 kernel-pae-extra-3.0.74-0.6.6.2 References: http://support.novell.com/security/cve/CVE-2012-2137.html http://support.novell.com/security/cve/CVE-2012-6548.html http://support.novell.com/security/cve/CVE-2012-6549.html http://support.novell.com/security/cve/CVE-2013-0160.html http://support.novell.com/security/cve/CVE-2013-0216.html http://support.novell.com/security/cve/CVE-2013-0231.html http://support.novell.com/security/cve/CVE-2013-0268.html http://support.novell.com/security/cve/CVE-2013-0311.html http://support.novell.com/security/cve/CVE-2013-0349.html http://support.novell.com/security/cve/CVE-2013-0913.html http://support.novell.com/security/cve/CVE-2013-0914.html http://support.novell.com/security/cve/CVE-2013-1767.html http://support.novell.com/security/cve/CVE-2013-1772.html http://support.novell.com/security/cve/CVE-2013-1774.html http://support.novell.com/security/cve/CVE-2013-1792.html http://support.novell.com/security/cve/CVE-2013-1796.html http://support.novell.com/security/cve/CVE-2013-1797.html http://support.novell.com/security/cve/CVE-2013-1798.html http://support.novell.com/security/cve/CVE-2013-1848.html http://support.novell.com/security/cve/CVE-2013-1860.html http://support.novell.com/security/cve/CVE-2013-2634.html http://support.novell.com/security/cve/CVE-2013-2635.html https://bugzilla.novell.com/578046 https://bugzilla.novell.com/651219 https://bugzilla.novell.com/714604 https://bugzilla.novell.com/722398 https://bugzilla.novell.com/730117 https://bugzilla.novell.com/736149 https://bugzilla.novell.com/738210 https://bugzilla.novell.com/744692 https://bugzilla.novell.com/753371 https://bugzilla.novell.com/754583 https://bugzilla.novell.com/754898 https://bugzilla.novell.com/758040 https://bugzilla.novell.com/758243 https://bugzilla.novell.com/761849 https://bugzilla.novell.com/762424 https://bugzilla.novell.com/763494 https://bugzilla.novell.com/767612 https://bugzilla.novell.com/768052 https://bugzilla.novell.com/773577 https://bugzilla.novell.com/776787 https://bugzilla.novell.com/777616 https://bugzilla.novell.com/777746 https://bugzilla.novell.com/779577 https://bugzilla.novell.com/780977 https://bugzilla.novell.com/786150 https://bugzilla.novell.com/786814 https://bugzilla.novell.com/786900 https://bugzilla.novell.com/787821 https://bugzilla.novell.com/788826 https://bugzilla.novell.com/789235 https://bugzilla.novell.com/789311 https://bugzilla.novell.com/789359 https://bugzilla.novell.com/790867 https://bugzilla.novell.com/792674 https://bugzilla.novell.com/792793 https://bugzilla.novell.com/793139 https://bugzilla.novell.com/793671 https://bugzilla.novell.com/794513 https://bugzilla.novell.com/794529 https://bugzilla.novell.com/794805 https://bugzilla.novell.com/795269 https://bugzilla.novell.com/795928 https://bugzilla.novell.com/795957 https://bugzilla.novell.com/795961 https://bugzilla.novell.com/796412 https://bugzilla.novell.com/796418 https://bugzilla.novell.com/796823 https://bugzilla.novell.com/797042 https://bugzilla.novell.com/797175 https://bugzilla.novell.com/798921 https://bugzilla.novell.com/799197 https://bugzilla.novell.com/799209 https://bugzilla.novell.com/799270 https://bugzilla.novell.com/799275 https://bugzilla.novell.com/799578 https://bugzilla.novell.com/799926 https://bugzilla.novell.com/800280 https://bugzilla.novell.com/800701 https://bugzilla.novell.com/801038 https://bugzilla.novell.com/801178 https://bugzilla.novell.com/801713 https://bugzilla.novell.com/801717 https://bugzilla.novell.com/801720 https://bugzilla.novell.com/801782 https://bugzilla.novell.com/802153 https://bugzilla.novell.com/802353 https://bugzilla.novell.com/802445 https://bugzilla.novell.com/802642 https://bugzilla.novell.com/802712 https://bugzilla.novell.com/803056 https://bugzilla.novell.com/803067 https://bugzilla.novell.com/803394 https://bugzilla.novell.com/803674 https://bugzilla.novell.com/803712 https://bugzilla.novell.com/804154 https://bugzilla.novell.com/804220 https://bugzilla.novell.com/804609 https://bugzilla.novell.com/804656 https://bugzilla.novell.com/805227 https://bugzilla.novell.com/805823 https://bugzilla.novell.com/806138 https://bugzilla.novell.com/806238 https://bugzilla.novell.com/806395 https://bugzilla.novell.com/806404 https://bugzilla.novell.com/806431 https://bugzilla.novell.com/806466 https://bugzilla.novell.com/806469 https://bugzilla.novell.com/806492 https://bugzilla.novell.com/806631 https://bugzilla.novell.com/806825 https://bugzilla.novell.com/806847 https://bugzilla.novell.com/806908 https://bugzilla.novell.com/806976 https://bugzilla.novell.com/806980 https://bugzilla.novell.com/807431 https://bugzilla.novell.com/807517 https://bugzilla.novell.com/807560 https://bugzilla.novell.com/807853 https://bugzilla.novell.com/808166 https://bugzilla.novell.com/808307 https://bugzilla.novell.com/808358 https://bugzilla.novell.com/808827 https://bugzilla.novell.com/808829 https://bugzilla.novell.com/808966 https://bugzilla.novell.com/808991 https://bugzilla.novell.com/809155 https://bugzilla.novell.com/809166 https://bugzilla.novell.com/809375 https://bugzilla.novell.com/809493 https://bugzilla.novell.com/809748 https://bugzilla.novell.com/809902 https://bugzilla.novell.com/809903 https://bugzilla.novell.com/810473 https://bugzilla.novell.com/812281 https://bugzilla.novell.com/812315 https://bugzilla.novell.com/813963 https://bugzilla.novell.com/816443 http://download.novell.com/patch/finder/?keywords=2a5bb3fed7ca52fa1263756d49887981 http://download.novell.com/patch/finder/?keywords=321273e62775269e941b35baa3690af6 http://download.novell.com/patch/finder/?keywords=3d3819f245738ad8a6e08ed09f3ce2c1 http://download.novell.com/patch/finder/?keywords=548f9d8addf88b2a79b70ae6357fc952 http://download.novell.com/patch/finder/?keywords=58c9c4e7bc17d527f9fce3eb90ef0b09 http://download.novell.com/patch/finder/?keywords=a19d6b6c758ef4ee0e1bca590c5dc7dc http://download.novell.com/patch/finder/?keywords=c61aa246f38f9114e57a2e7386bb83e7 http://download.novell.com/patch/finder/?keywords=dfc893bfb7fe2d0ab657f39e000c19ad http://download.novell.com/patch/finder/?keywords=f7787de7cb17f8ee089e716b636ef3d2 From sle-security-updates at lists.suse.com Tue May 7 21:04:22 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 8 May 2013 05:04:22 +0200 (CEST) Subject: SUSE-SU-2013:0759-2: important: Security update for Linux kernel Message-ID: <20130508030422.94D5132258@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0759-2 Rating: important References: #578046 #651219 #714604 #722398 #730117 #736149 #738210 #744692 #753371 #754583 #754898 #758040 #758243 #761849 #762424 #763494 #767612 #768052 #773577 #776787 #777616 #777746 #779577 #780977 #786150 #786814 #786900 #787821 #788826 #789235 #789311 #789359 #790867 #792674 #792793 #793139 #793671 #794513 #794529 #794805 #795269 #795928 #795957 #795961 #796412 #796418 #796823 #797042 #797175 #798921 #799197 #799209 #799270 #799275 #799578 #799926 #800280 #800701 #801038 #801178 #801713 #801717 #801720 #801782 #802153 #802353 #802445 #802642 #802712 #803056 #803067 #803394 #803674 #803712 #804154 #804220 #804609 #804656 #805227 #805823 #806138 #806238 #806395 #806404 #806431 #806466 #806469 #806492 #806631 #806825 #806847 #806908 #806976 #806980 #807431 #807517 #807560 #807853 #808166 #808307 #808358 #808827 #808829 #808966 #808991 #809155 #809166 #809375 #809493 #809748 #809902 #809903 #810473 #812281 #812315 #813963 #816443 Cross-References: CVE-2012-2137 CVE-2012-6548 CVE-2012-6549 CVE-2013-0160 CVE-2013-0216 CVE-2013-0231 CVE-2013-0268 CVE-2013-0311 CVE-2013-0349 CVE-2013-0913 CVE-2013-0914 CVE-2013-1767 CVE-2013-1772 CVE-2013-1774 CVE-2013-1792 CVE-2013-1796 CVE-2013-1797 CVE-2013-1798 CVE-2013-1848 CVE-2013-1860 CVE-2013-2634 CVE-2013-2635 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise High Availability Extension 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that solves 22 vulnerabilities and has 95 fixes is now available. It includes one version update. Description: The SUSE Linux Enterprise 11 SP2 kernel has been updated to 3.0.74 fix various security issues and bugs: This update brings some features: * Updated HD-audio drivers for Nvidia/AMD HDMI and Haswell audio (FATE#314311 FATE#313695) * Lustre enablement patches were added (FATE#314679). * SGI UV (Ultraviolet) platform support. (FATE#306952) Security issues fixed in this update: * CVE-2013-0349: The hidp_setup_hid function in net/bluetooth/hidp/core.c in the Linux kernel did not properly copy a certain name field, which allowed local users to obtain sensitive information from kernel memory by setting a long name and making an HIDPCONNADD ioctl call. * CVE-2012-2137: Buffer overflow in virt/kvm/irq_comm.c in the KVM subsystem in the Linux kernel allowed local users to cause a denial of service (crash) and to possibly execute arbitrary code via vectors related to Message Signaled Interrupts (MSI), irq routing entries, and an incorrect check by the setup_routing_entry function before invoking the kvm_set_irq function. * CVE-2012-6549: The isofs_export_encode_fh function in fs/isofs/export.c in the Linux kernel did not initialize a certain structure member, which allowed local users to obtain sensitive information from kernel heap memory via a crafted application. * CVE-2012-6548: The udf_encode_fh function in fs/udf/namei.c in the Linux kernel did not initialize a certain structure member, which allowed local users to obtain sensitive information from kernel heap memory via a crafted application. * CVE-2013-0160: Timing side channel on attacks were possible on /dev/ptmx that could allow local attackers to predict keypresses like e.g. passwords. This has been fixed by not updating accessed/modified time on the pty devices. Note that this might break pty idle detection, so it might get reverted again. * CVE-2013-0216: The Xen netback functionality in the Linux kernel allowed guest OS users to cause a denial of service (loop) by triggering ring pointer corruption. * CVE-2013-0231: The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux allowed guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. * CVE-2013-0311: The translate_desc function in drivers/vhost/vhost.c in the Linux kernel did not properly handle cross-region descriptors, which allowed guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges. * CVE-2013-0913: Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel allowed local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition. * CVE-2013-0914: The flush_signal_handlers function in kernel/signal.c in the Linux kernel preserved the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application containing a sigaction system call. * CVE-2013-1767: Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel allowed local users to gain privileges or to cause a denial of service (system crash) by remounting a tmpfs filesystem without specifying a required mpol (aka mempolicy) mount option. * CVE-2013-1772: The log_prefix function in kernel/printk.c in the Linux kernel 3.x did not properly remove a prefix string from a syslog header, which allowed local users to cause a denial of service (buffer overflow and system crash) by leveraging /dev/kmsg write access and triggering a call_console_drivers function call. * CVE-2013-1774: The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) via an attempted /dev/ttyUSB read or write operation on a disconnected Edgeport USB serial converter. * CVE-2013-1792: Race condition in the install_user_keyrings function in security/keys/process_keys.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) via crafted keyctl system calls that trigger keyring operations in simultaneous threads. * CVE-2013-1796: The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel did not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allowed guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application. * CVE-2013-1797: Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel allowed guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation. * CVE-2013-1798: The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel did not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application. * CVE-2013-1848: fs/ext3/super.c in the Linux kernel used incorrect arguments to functions in certain circumstances related to printk input, which allowed local users to conduct format-string attacks and possibly gain privileges via a crafted application. * CVE-2013-1860: Heap-based buffer overflow in the wdm_in_callback function in drivers/usb/class/cdc-wdm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or to possibly execute arbitrary code via a crafted cdc-wdm USB device. * CVE-2013-2634: net/dcb/dcbnl.c in the Linux kernel did not initialize certain structures, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application. * CVE-2013-2635: The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain structure member, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application. * CVE-2013-0268: The msr_open function in arch/x86/kernel/msr.c in the Linux kernel allowed local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c. Bugs fixed in this update: BTRFS: * btrfs: do not try to notify udev about missing devices. * btrfs: add cancellation points to defrag. * btrfs: define BTRFS_MAGIC as a u64 value. * btrfs: make sure NODATACOW also gets NODATASUM set. * btrfs: enforce min_bytes parameter during extent allocation. * btrfs: build up error handling for merge_reloc_roots. * btrfs: free all recorded tree blocks on error . * btrfs: do not BUG_ON in prepare_to_reloc . * btrfs: do not BUG_ON on aborted situation . * btrfs: handle a bogus chunk tree nicely . * btrfs: do not drop path when printing out tree errors in scrub . * btrfs: make subvol creation/deletion killable in the early stages. * btrfs: abort unlink trans in missed error case. * btrfs: fix reada debug code compilation. * btrfs: return error when we specify wrong start to defrag. * btrfs: do not force pages under writeback to finish when aborting. USB: * USB: move usb_translate_errors to 1/usb (bnc#806908). * USB: add EOPNOTSUPP to usb_translate_errors (bnc#806908). * USB: cdc-wdm: sanitize error returns (bnc#806908). * USB: cdc-wdm: cleanup error codes (bnc#806908). * USB: cdc-wdm: add helper to preserve kABI (bnc#806908). * USB: Do not use EHCI port sempahore for USB 3.0 hubs (bnc#807560). * USB: Prepare for refactoring by adding extra udev checks (bnc#807560). * USB: Rip out recursive call on warm port reset (bnc#807560). * USB: Fix connected device switch to Inactive state (bnc#807560). * USB: modify hub to detect unplugs in all states (bnc#807560). * USB: io_ti: Fix NULL dereference in chase_port() (bnc#806976, CVE-2013-1774). * USB: cdc-wdm: fix buffer overflow (bnc#806431). * USB: cdc-wdm: cannot use dev_printk when device is gone (bnc#806469). * USB: cdc-wdm: fix memory leak (bnc#806466). * elousb: really long delays for broken devices (bnc#795269). * xhci: Fix conditional check in bandwidth calculation (bnc#795961). * xHCI: Fix TD Size calculation on 1.0 hosts (bnc#795957). * xhci: avoid dead ports, add roothub port polling (bnc#799197). * USB: Handle warm reset failure on empty port (bnc#799926). * USB: Ignore port state until reset completes (bnc#799926). * Allow USB 3.0 ports to be disabled (bnc#799926). * USB: Ignore xHCI Reset Device status (bnc#799926). * USB: Handle auto-transition from hot to warm reset (bnc#799926). S/390: * ipl: Implement diag308 loop for zfcpdump (bnc#801720, LTC#88197). * zcore: Add hsa file (bnc#801720, LTC#88198). * kernel: support physical memory > 4TB (bnc#801720, LTC#88787). * mm: Fix crst upgrade of mmap with MAP_FIXED (bnc#801720, LTC#88797). * Update patches.suse/zcrypt-feed-hwrandom (bnc#806825). Allow zcrypt module unload even when the thread is blocked writing to a full random pool. * dca: check against empty dca_domains list before unregister provider fix. * s390/kvm: Fix store status for ACRS/FPRS fix. * series.conf: disabled patches.arch/s390-64-03-kernel-inc-phys-mem.patch due to excessive kabi break. (bnc#801720) ALSA: * patches.drivers/alsa-sp3-pre-695-Yet-another-fix-for-broken- HSW-HDMI-pin: Refresh. Fix the invalid PCI SSID check (bnc#806404) * ALSA: hda - Support mute LED on HP AiO buttons (bnc#808991). * ALSA: hda: Allow multple SPDIF controls per codec (bnc#780977). * ALSA: hda: Virtualize SPDIF out controls (bnc#780977). * ALSA: hda: Separate generic and non-generic implementations. * ALSA: hda: hdmi_eld_update_pcm_info: update a stream in place. * ALSA: hda: HDMI: Support codecs with fewer cvts than pins. * ALSA: hda - Add snd_hda_get_conn_list() helper function. * ALSA: hda - Add snd_hda_override_conn_list() helper function. * ALSA: hda - Increase the max number of coverters/pins in patch_hdmi.c (bnc#780977). * ALSA: hda - Check non-snoop in a single place (bnc#801713). * ALSA: HDA: Use LPIB Position fix for Intel SCH Poulsbo (bnc#801713). * ALSA: hda_intel: Add Oaktrail identifiers (bnc#801713). * ALSA: HDA: Use LPIB position fix for Oaktrail (bnc#801713). * ALSA: hda - add id for Atom Cedar Trail HDMI codec (bnc#801713). * ALSA: hda - Fix detection of Creative SoundCore3D controllers (bnc#762424). * ALSA: hda - add power states information in proc (bnc#801713). * ALSA: hda - Show D3cold state in proc files (bnc#801713). * ALSA: hda - check supported power states (bnc#801713). * ALSA: hda - reduce msleep time if EPSS power states supported (bnc#801713). * ALSA: hda - check proper return value (bnc#801713). * ALSA: hda - power setting error check (bnc#801713). * ALSA: hda - Add DeviceID for Haswell HDA (bnc#801713). * ALSA: hda - add Haswell HDMI codec id (bnc#801713). * ALSA: hda - Fix driver type of Haswell controller to AZX_DRIVER_SCH. * ALSA: hda - Add new GPU codec ID to snd-hda (bnc#780977). * ALSA: HDMI - Fix channel_allocation array wrong order (bnc#801713). * ALSA: hda - Avoid BDL position workaround when no_period_wakeup is set (bnc#801713). * ALSA: hda - Allow to pass position_fix=0 explicitly (bnc#801713). * ALSA: hda - Add another pci id for Haswell board. * ALSA: hda - force use of SSYNC bits (bnc#801713). * ALSA: hda - use LPIB for delay estimation (bnc#801713). * ALSA: hda - add PCI identifier for Intel 5 Series/3400 (bnc#801713). * ALSA: hda - Add workaround for conflicting IEC958 controls (FATE#314311). * ALSA: hda - Stop LPIB delay counting on broken hardware (FATE#313695). * ALSA: hda - Always turn on pins for HDMI/DP (FATE#313695). * ALSA: hda - bug fix for invalid connection list of Haswell HDMI codec pins (FATE#313695). * ALSA - HDA: New PCI ID for Haswell ULT (bnc#801713). * ALSA: hda - Release assigned pin/cvt at error path of hdmi_pcm_open() (bnc#801713). * ALSA: hda - Support rereading widgets under the function group (bnc#801713). * ALSA: hda - Add fixup for Haswell to enable all pin and convertor widgets (bnc#801713). * ALSA: hda - Yet another fix for broken HSW HDMI pin connections (bnc#801713). * patches.kabi/alsa-spdif-update-kabi-fixes: Fix kABI breakage due to HD-audio HDMI updates (bnc#780977). * ALSA: hda - Fix non-snoop page handling (bnc#800701). * ALSA: hda - Apply mic-mute LED fixup for new HP laptops (bnc#796418). * patches.drivers/alsa-sp3-pre-695-Yet-another-fix-for-broken- HSW-HDMI-pin: Refresh. Fix a superfluous incremental leading to the double array size (bnc#808966) XEN: * pciback: notify hypervisor about devices intended to be assigned to guests. * patches.xen/xen-clockevents: Update (bnc#803712). * patches.xen/xen-ipi-per-cpu-irq: Update (bnc#803712). * patches.xen/xen3-patch-2.6.19: Update (bnc#809166). * Update Xen patches to 3.0.68. * Update Xen patches to 3.0.63. * netback: fix netbk_count_requests(). * x86/mm: Check if PUD is large when validating a kerneladdress (bnc#794805). OTHER: * Revert dmi_scan: fix missing check for _DMI_ signature in smbios_present(). * Revert drivers/firmware/dmi_scan.c: fetch dmi version from SMBIOS if it exists. * Revert drivers/firmware/dmi_scan.c: check dmi version when get system uuid. * sysfs: Revert sysfs: fix race between readdir and lseek (bnc#816443). * 8021q: Revert 8021q: fix a potential use-after-free. * /dev/urandom returning EOF: trim down revert to not change kabi. (bnc#789359). * tun: reserves space for network in skb (bnc#803394). * Fixed /dev/urandom returning EOF (bnc#789359). * mm: Make snapshotting pages for stable writes a per-bio operation * fs: Only enable stable page writes when necessary (bnc#807517). * patches.drivers/ixgbe-Address-fact-that-RSC-was-not-setting- GSO-size.patch: Fix bnc#802712 * Fix build error without CONFIG_BOOTSPLASH * Fix bootsplash breakage due to 3.0.67 stable fix (bnc#813963) * drivers/base/memory.c: fix memory_dev_init() long delay (bnc#804609). * mtd: drop physmap_configure (bnc#809375). * Bluetooth: btusb: hide more usb_submit_urb errors (bnc#812281). * o2dlm: fix NULL pointer dereference in o2dlm_blocking_ast_wrapper (bnc#806492) * qeth: fix qeth_wait_for_threads() deadlock for OSN devices (bnc#812315, LTC#90910). * Fix NULL pointer dereference in o2dlm_blocking_ast_wrapper (bnc#806492) * mm: fix ALLOC_WMARK_MASK check (bnc#808166) * pciehp: Fix dmi match table definition and missing space in printk (bnc#796412). * fnic: Fix SGEs limit (bnc#807431). * pciehp: Ignore missing surprise bit on some hosts (bnc#796412). * ipv6: Queue fragments per interface for multicast/link-local addresses (bnc#804220). * netfilter: send ICMPv6 message on fragment reassembly timeout (bnc#773577). * netfilter: fix sending ICMPv6 on netfilter reassembly timeout (bnc#773577). * jbd: clear revoked flag on buffers before a new transaction started (bnc#806395). * xfrm6: count extension headers into payload length (bnc#794513). * mm: page_alloc: Avoid marking zones full prematurely after zone_reclaim() (Evict inactive pages when zone_reclaim is enabled (bnc#808166)). * st: Take additional queue ref in st_probe (bnc#801038, bnc#788826). * drivers: xhci: fix incorrect bit test (bnc#714604). * xfrm: remove unused xfrm4_policy_fini() (bnc#801717). * xfrm: make gc_thresh configurable in all namespaces (bnc#801717). * kabi: use net_generic to avoid changes in struct net (bnc#801717). * xfs: Fix WARN_ON(delalloc) in xfs_vm_releasepage() (bnc#806631). * patches.drivers/alsa-sp2-hda-033-Support-mute-LED-on-HP-AiO- buttons: Refresh tags. * block: use i_size_write() in bd_set_size() (bnc#809748). * loopdev: fix a deadlock (bnc#809748). * patches.suse/supported-flag: fix mis-reported supported status (bnc#809493). * patches.suse/supported-flag-enterprise: Refresh. * KVM: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache_init (bnc#806980 CVE-2013-1797). * KVM: Fix bounds checking in ioapic indirect register read (bnc#806980 CVE-2013-1798). * KVM: Fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (bnc#806980 CVE-2013-1796). * KVM: introduce kvm_read_guest_cached (bnc#806980). * x86/numa: Add constraints check for nid parameters (Cope with negative SRAT distances (bnc#807853)). * drm/i915: Periodically sanity check power management (bnc#808307). * drm/i915: bounds check execbuffer relocation count (bnc#808829,CVE-2013-0913). * ext3: Fix format string issues (bnc#809155, CVE-2013-1848). * x86-64: Fix memset() to support sizes of 4Gb and above (Properly initialise memmap on large machines (bnc#802353)). * bdi: allow block devices to say that they require stable page writes * mm: only enforce stable page writes if the backing device requires it * block: optionally snapshot page contents to provide stable pages during write * 9pfs: fix filesystem to wait for stable page writeback * ocfs2: wait for page writeback to provide stable pages * ubifs: wait for page writeback to provide stable pages * Only enable stable page writes when required by underlying BDI (bnc#807517). * KVM: emulator: drop RPL check from linearize() function (bnc#754583). * mlx4: Correct calls to to_ib_ah_attr() (bnc#806847). * DRM/i915: On G45 enable cursor plane briefly after enabling the display plane (bnc #753371) [backported from drm-intel-fixes]. * cxgb4i: Remove the scsi host device when removing device (bnc#722398) * xprtrdma: The transport should not bug-check when a dup reply is received (bnc#763494). * tmpfs: fix use-after-free of mempolicy object (bnc#806138, CVE-2013-1767). * lpfc: Check fc_block_scsi_eh return value correctly for lpfc_abort_handler (bnc#803674). * md: fix bug in handling of new_data_offset (bnc#805823). * md: Avoid OOPS when reshaping raid1 to raid0 (Useful OOPS fix). * md: fix two bugs when attempting to resize RAID0 array (Useful BUG() fix). * md: raid0: fix error return from create_stripe_zones (useful bug fix). * ext4: add missing kfree() on error return path in add_new_gdb(). * ext4: Free resources in some error path in ext4_fill_super. * intel_idle: support Haswell (fate#313720). * hp_accel: Add a new PnP ID HPQ6007 for new HP laptops (bnc#802445). * nfs: Ensure NFS does not block on dead server during unmount (bnc#794529). * block: disable discard request merge temporarily (bnc#803067). * mm: mmu_notifier: have mmu_notifiers use a global SRCU so they may safely schedule * mm: mmu_notifier: make the mmu_notifier srcu static * mmu_notifier_unregister NULL Pointer deref and multiple ->release() callouts * Have mmu_notifiers use SRCU so they may safely schedule kabi compatability * patches.fixes/Have-mmu_notifiers-use-SRCU-so-they-may-safely -schedule.patch: * patches.fixes/Have-mmu_notifiers-use-SRCU-so-they-may-safely -schedule-build-fix.patch: Delete, replace with upstream equivalent and add KABI workaround (bnc#578046, bnc#786814, FATE#306952). * ipv6: Do not send packet to big messages to self (bnc#786150). * hpwdt: Unregister NMI events on exit (bnc#777746). * x86/mm: Check if PUD is large when validating a kernel address (bnc#794805). * ata: Fix DVD not dectected at some Haswell platforms (bnc#792674). * Avoid softlockups in printk (bnc#744692, bnc#789311). * Do not pack credentials for dying processes (bnc#779577, bnc#803056). * xfs: punch new delalloc blocks out of failed writes inside EOF (bnc#761849). * xfs: xfs_sync_data is redundant (bnc#761849). * Add GPIO support for Intel Centerton SOC (bnc#792793). * Add Multifunction Device support for Intel Centerton SOC (bnc#792793). * Add Intel Legacy Block support for Intel Centerton SOC (bnc#792793). * mm: net: Allow some !SOCK_MEMALLOC traffic through even if skb_pfmemalloc (Allow GPFS network traffic despite PF_MEMALLOC misuse (bnc#786900)). * kernel/resource.c: fix stack overflow in __reserve_region_with_split() (bnc#801782). * Lustre enablement patches * block: add dev_check_rdonly and friends for Lustre testing (FATE#314679). * dcache: Add DCACHE_LUSTRE_INVALID flag for Lustre to handle its own invalidation (FATE#314679). * lsm: export security_inode_unlink (FATE#315679). * lustre: Add lustre kernel version (FATE#314679). * st: fix memory leak with >1MB tape I/O (bnc#798921). * cifs: lower default wsize when 1 extensions are not used (bnc#799578). * ata_generic: Skip is_intel_ider() check when ata_generic=1 is set (bnc#777616). * quota: autoload the quota_v2 module for QFMT_VFS_V1 quota format (bnc#802153). * xen: properly bound buffer access when parsing cpu/availability. * netback: shutdown the ring if it contains garbage (CVE-2013-0216 XSA-39 bnc#800280). * netback: correct netbk_tx_err() to handle wrap around (CVE-2013-0216 XSA-39 bnc#800280). * pciback: rate limit error message from pciback_enable_msi() (CVE-2013-0231 XSA-43 bnc#801178). * scsiback/usbback: move cond_resched() invocations to proper place. * drm/i915: Implement workaround for broken CS tlb on i830/845 (bnc #758040). * drivers: scsi: storvsc: Initialize the sglist. * e1000e: 82571 Fix Tx Data Corruption during Tx hang recovery (bnc#790867). * KVM: Fix buffer overflow in kvm_set_irq() (bnc#767612 CVE-2012-2137). * mm: compaction: Abort async compaction if locks are contended or taking too long. * mm: compaction: abort compaction loop if lock is contended or run too long. * mm: compaction: acquire the zone->lock as late as possible. * mm: compaction: acquire the zone->lru_lock as late as possible. * mm: compaction: move fatal signal check out of compact_checklock_irqsave. Reduce LRU and zone lock contention when compacting memory for THP (bnc#796823). Security Issue references: * CVE-2012-6548 * CVE-2012-6549 * CVE-2012-2137 * CVE-2013-0160 * CVE-2013-0216 * CVE-2013-0231 * CVE-2013-0913 * CVE-2013-0914 * CVE-2013-1767 * CVE-2013-1774 * CVE-2013-1796 * CVE-2013-1797 * CVE-2013-1798 * CVE-2013-1848 * CVE-2013-1860 * CVE-2013-2634 * CVE-2013-2635 * CVE-2013-1792 * CVE-2013-0311 * CVE-2013-1772 * CVE-2013-0268 * CVE-2013-0349 Indications: Everyone using the Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-kernel-7675 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-kernel-7675 - SUSE Linux Enterprise High Availability Extension 11 SP2: zypper in -t patch sleshasp2-kernel-7675 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-kernel-7675 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64) [New Version: 3.0.74]: kernel-default-3.0.74-0.6.6.2 kernel-default-base-3.0.74-0.6.6.2 kernel-default-devel-3.0.74-0.6.6.2 kernel-source-3.0.74-0.6.6.2 kernel-syms-3.0.74-0.6.6.2 kernel-trace-3.0.74-0.6.6.2 kernel-trace-base-3.0.74-0.6.6.2 kernel-trace-devel-3.0.74-0.6.6.2 kernel-xen-devel-3.0.74-0.6.6.2 xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 - SUSE Linux Enterprise Server 11 SP2 (x86_64) [New Version: 3.0.74]: kernel-default-3.0.74-0.6.6.2 kernel-default-base-3.0.74-0.6.6.2 kernel-default-devel-3.0.74-0.6.6.2 kernel-ec2-3.0.74-0.6.6.2 kernel-ec2-base-3.0.74-0.6.6.2 kernel-ec2-devel-3.0.74-0.6.6.2 kernel-source-3.0.74-0.6.6.2 kernel-syms-3.0.74-0.6.6.2 kernel-trace-3.0.74-0.6.6.2 kernel-trace-base-3.0.74-0.6.6.2 kernel-trace-devel-3.0.74-0.6.6.2 kernel-xen-3.0.74-0.6.6.2 kernel-xen-base-3.0.74-0.6.6.2 kernel-xen-devel-3.0.74-0.6.6.2 xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 - SUSE Linux Enterprise High Availability Extension 11 SP2 (x86_64): cluster-network-kmp-default-1.4_3.0.74_0.6.6-2.18.36 cluster-network-kmp-trace-1.4_3.0.74_0.6.6-2.18.36 cluster-network-kmp-xen-1.4_3.0.74_0.6.6-2.18.36 gfs2-kmp-default-2_3.0.74_0.6.6-0.7.69 gfs2-kmp-trace-2_3.0.74_0.6.6-0.7.69 gfs2-kmp-xen-2_3.0.74_0.6.6-0.7.69 ocfs2-kmp-default-1.6_3.0.74_0.6.6-0.11.35 ocfs2-kmp-trace-1.6_3.0.74_0.6.6-0.11.35 ocfs2-kmp-xen-1.6_3.0.74_0.6.6-0.11.35 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64) [New Version: 3.0.74]: kernel-default-3.0.74-0.6.6.2 kernel-default-base-3.0.74-0.6.6.2 kernel-default-devel-3.0.74-0.6.6.2 kernel-default-extra-3.0.74-0.6.6.2 kernel-source-3.0.74-0.6.6.2 kernel-syms-3.0.74-0.6.6.2 kernel-trace-3.0.74-0.6.6.2 kernel-trace-base-3.0.74-0.6.6.2 kernel-trace-devel-3.0.74-0.6.6.2 kernel-trace-extra-3.0.74-0.6.6.2 kernel-xen-3.0.74-0.6.6.2 kernel-xen-base-3.0.74-0.6.6.2 kernel-xen-devel-3.0.74-0.6.6.2 kernel-xen-extra-3.0.74-0.6.6.2 xen-kmp-default-4.1.4_02_3.0.74_0.6.6-0.5.22 xen-kmp-trace-4.1.4_02_3.0.74_0.6.6-0.5.22 References: http://support.novell.com/security/cve/CVE-2012-2137.html http://support.novell.com/security/cve/CVE-2012-6548.html http://support.novell.com/security/cve/CVE-2012-6549.html http://support.novell.com/security/cve/CVE-2013-0160.html http://support.novell.com/security/cve/CVE-2013-0216.html http://support.novell.com/security/cve/CVE-2013-0231.html http://support.novell.com/security/cve/CVE-2013-0268.html http://support.novell.com/security/cve/CVE-2013-0311.html http://support.novell.com/security/cve/CVE-2013-0349.html http://support.novell.com/security/cve/CVE-2013-0913.html http://support.novell.com/security/cve/CVE-2013-0914.html http://support.novell.com/security/cve/CVE-2013-1767.html http://support.novell.com/security/cve/CVE-2013-1772.html http://support.novell.com/security/cve/CVE-2013-1774.html http://support.novell.com/security/cve/CVE-2013-1792.html http://support.novell.com/security/cve/CVE-2013-1796.html http://support.novell.com/security/cve/CVE-2013-1797.html http://support.novell.com/security/cve/CVE-2013-1798.html http://support.novell.com/security/cve/CVE-2013-1848.html http://support.novell.com/security/cve/CVE-2013-1860.html http://support.novell.com/security/cve/CVE-2013-2634.html http://support.novell.com/security/cve/CVE-2013-2635.html https://bugzilla.novell.com/578046 https://bugzilla.novell.com/651219 https://bugzilla.novell.com/714604 https://bugzilla.novell.com/722398 https://bugzilla.novell.com/730117 https://bugzilla.novell.com/736149 https://bugzilla.novell.com/738210 https://bugzilla.novell.com/744692 https://bugzilla.novell.com/753371 https://bugzilla.novell.com/754583 https://bugzilla.novell.com/754898 https://bugzilla.novell.com/758040 https://bugzilla.novell.com/758243 https://bugzilla.novell.com/761849 https://bugzilla.novell.com/762424 https://bugzilla.novell.com/763494 https://bugzilla.novell.com/767612 https://bugzilla.novell.com/768052 https://bugzilla.novell.com/773577 https://bugzilla.novell.com/776787 https://bugzilla.novell.com/777616 https://bugzilla.novell.com/777746 https://bugzilla.novell.com/779577 https://bugzilla.novell.com/780977 https://bugzilla.novell.com/786150 https://bugzilla.novell.com/786814 https://bugzilla.novell.com/786900 https://bugzilla.novell.com/787821 https://bugzilla.novell.com/788826 https://bugzilla.novell.com/789235 https://bugzilla.novell.com/789311 https://bugzilla.novell.com/789359 https://bugzilla.novell.com/790867 https://bugzilla.novell.com/792674 https://bugzilla.novell.com/792793 https://bugzilla.novell.com/793139 https://bugzilla.novell.com/793671 https://bugzilla.novell.com/794513 https://bugzilla.novell.com/794529 https://bugzilla.novell.com/794805 https://bugzilla.novell.com/795269 https://bugzilla.novell.com/795928 https://bugzilla.novell.com/795957 https://bugzilla.novell.com/795961 https://bugzilla.novell.com/796412 https://bugzilla.novell.com/796418 https://bugzilla.novell.com/796823 https://bugzilla.novell.com/797042 https://bugzilla.novell.com/797175 https://bugzilla.novell.com/798921 https://bugzilla.novell.com/799197 https://bugzilla.novell.com/799209 https://bugzilla.novell.com/799270 https://bugzilla.novell.com/799275 https://bugzilla.novell.com/799578 https://bugzilla.novell.com/799926 https://bugzilla.novell.com/800280 https://bugzilla.novell.com/800701 https://bugzilla.novell.com/801038 https://bugzilla.novell.com/801178 https://bugzilla.novell.com/801713 https://bugzilla.novell.com/801717 https://bugzilla.novell.com/801720 https://bugzilla.novell.com/801782 https://bugzilla.novell.com/802153 https://bugzilla.novell.com/802353 https://bugzilla.novell.com/802445 https://bugzilla.novell.com/802642 https://bugzilla.novell.com/802712 https://bugzilla.novell.com/803056 https://bugzilla.novell.com/803067 https://bugzilla.novell.com/803394 https://bugzilla.novell.com/803674 https://bugzilla.novell.com/803712 https://bugzilla.novell.com/804154 https://bugzilla.novell.com/804220 https://bugzilla.novell.com/804609 https://bugzilla.novell.com/804656 https://bugzilla.novell.com/805227 https://bugzilla.novell.com/805823 https://bugzilla.novell.com/806138 https://bugzilla.novell.com/806238 https://bugzilla.novell.com/806395 https://bugzilla.novell.com/806404 https://bugzilla.novell.com/806431 https://bugzilla.novell.com/806466 https://bugzilla.novell.com/806469 https://bugzilla.novell.com/806492 https://bugzilla.novell.com/806631 https://bugzilla.novell.com/806825 https://bugzilla.novell.com/806847 https://bugzilla.novell.com/806908 https://bugzilla.novell.com/806976 https://bugzilla.novell.com/806980 https://bugzilla.novell.com/807431 https://bugzilla.novell.com/807517 https://bugzilla.novell.com/807560 https://bugzilla.novell.com/807853 https://bugzilla.novell.com/808166 https://bugzilla.novell.com/808307 https://bugzilla.novell.com/808358 https://bugzilla.novell.com/808827 https://bugzilla.novell.com/808829 https://bugzilla.novell.com/808966 https://bugzilla.novell.com/808991 https://bugzilla.novell.com/809155 https://bugzilla.novell.com/809166 https://bugzilla.novell.com/809375 https://bugzilla.novell.com/809493 https://bugzilla.novell.com/809748 https://bugzilla.novell.com/809902 https://bugzilla.novell.com/809903 https://bugzilla.novell.com/810473 https://bugzilla.novell.com/812281 https://bugzilla.novell.com/812315 https://bugzilla.novell.com/813963 https://bugzilla.novell.com/816443 http://download.novell.com/patch/finder/?keywords=2f736fd60525e237201b485f497a314b From sle-security-updates at lists.suse.com Wed May 8 15:04:37 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 8 May 2013 23:04:37 +0200 (CEST) Subject: SUSE-SU-2013:0707-2: moderate: Security update for Ruby On Rails 3.2 stack Message-ID: <20130508210437.3106D32269@maintenance.suse.de> SUSE Security Update: Security update for Ruby On Rails 3.2 stack ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0707-2 Rating: moderate References: #809932 #809935 #809940 Cross-References: CVE-2013-1854 Affected Products: WebYaST 1.3 SUSE Studio Onsite 1.3 SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Lifecycle Management Server 1.3 ______________________________________________________________________________ An update that solves one vulnerability and has two fixes is now available. It includes two new package versions. Description: The Ruby on Rails 3.2 stack has been updated to 3.2.12 to fix various security issues and bugs: * rubygem-actionmailer-3_2: has been updated to 3.2.12. * rubygem-actionpack-3_2: has been updated to 3.2.12. * rubygem-activeresource-3_2: has been updated to 3.2.12. * rubygem-activesupport-3_2: has been updated to 3.2.12. * rubygem-railties-3_2: has been updated to 3.2.12. * rubygem-rails-3_2: has been updated to 3.2.12. * rubygem-activemodel-3_2: has been updated to 3.2.12, received a security fix for CVE-2013-0276: Fix issue with attr_protected where malformed input could circumvent protection * rubygem-activerecord-3_2: has been updated to 3.2.12, received a security fix for CVE-2013-0276: o Quote numeric values being compared to non-numeric columns. Otherwise, in some database, the string column values will be coerced to a numeric allowing 0, 0.0 or false to match any string starting with a non-digit. Read more about this problem here . * A XSS in sanitize_css in Action Pack has been fixed (CVE-2013-1855) * A XSS Vulnerability in the sanitize helper of Ruby on Rails Action Pack has been fixed (CVE-2013-1857) * A Symbol DoS vulnerability in Active Record has been fixed. (CVE-2013-1854) * Also rubygem-rack-1_4 has been updated to 1.4.5 (bnc#802794 bnc#802795) o Fix CVE-2013-0263, timing attack against Rack::Session::Cookie o Fix CVE-2013-0262, symlink path traversal in Rack::File o update to 1.4.4 (bnc#798452) + [SEC] Rack::Auth::AbstractRequest no longer symbolizes arbitrary strings (CVE-2013-0184) o changes from 1.4.3 + Security: Prevent unbounded reads in large multipart boundaries (CVE-2013-0183) o changes from 1.4.2 (CVE-2012-6109) + Add warnings when users do not provide a session secret + Fix parsing performance for unquoted filenames + Updated URI backports + Fix URI backport version matching, and silence constant warnings + Correct parameter parsing with empty values + Correct rackup '-I' flag, to allow multiple uses + Correct rackup pidfile handling + Report rackup line numbers correctly + Fix request loops caused by non-stale nonces with time limits + Fix reloader on Windows + Prevent infinite recursions from Response#to_ary + Various middleware better conforms to the body close specification + Updated language for the body close specification + Additional notes regarding ECMA escape compatibility issues + Fix the parsing of multiple ranges in range headers + Prevent errors from empty parameter keys + Added PATCH verb to Rack::Request + Various documentation updates + Fix session merge semantics (fixes rack-test) + Rack::Static :index can now handle multiple directories + All tests now utilize Rack::Lint (special thanks to Lars Gierth) + Rack::File cache_control parameter is now deprecated, and removed by 1.5 + Correct Rack::Directory script name escaping + Rack::Static supports header rules for sophisticated configurations + Multipart parsing now works without a Content-Length header + New logos courtesy of Zachary Scott! + Rack::BodyProxy now explicitly defines #each, useful for C extensions + Cookies that are not URI escaped no longer cause exceptions Security Issues: * CVE-2013-1854 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST 1.3: zypper in -t patch slewyst13-rubyrails-3_2-201304-7617 - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-rubyrails-3_2-201304-7617 - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-rubyrails-3_2-201304-7617 - SUSE Lifecycle Management Server 1.3: zypper in -t patch sleslms13-rubyrails-3_2-201304-7617 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST 1.3 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.4.5 and 3.2.12]: rubygem-actionmailer-3_2-3.2.12-0.5.9 rubygem-actionpack-3_2-3.2.12-0.7.1 rubygem-activemodel-3_2-3.2.12-0.5.8 rubygem-activerecord-3_2-3.2.12-0.7.1 rubygem-activeresource-3_2-3.2.12-0.5.8 rubygem-activesupport-3_2-3.2.12-0.5.8 rubygem-rack-1_4-1.4.5-0.5.8 rubygem-rails-3_2-3.2.12-0.5.10 rubygem-railties-3_2-3.2.12-0.7.9 - SUSE Studio Onsite 1.3 (x86_64) [New Version: 1.4.5 and 3.2.12]: rubygem-actionmailer-3_2-3.2.12-0.5.9 rubygem-actionpack-3_2-3.2.12-0.7.1 rubygem-activemodel-3_2-3.2.12-0.5.8 rubygem-activerecord-3_2-3.2.12-0.7.1 rubygem-activeresource-3_2-3.2.12-0.5.8 rubygem-activesupport-3_2-3.2.12-0.5.8 rubygem-rack-1_4-1.4.5-0.5.8 rubygem-rails-3_2-3.2.12-0.5.10 rubygem-railties-3_2-3.2.12-0.7.9 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.4.5 and 3.2.12]: rubygem-activesupport-3_2-3.2.12-0.5.8 rubygem-rack-1_4-1.4.5-0.5.8 - SUSE Lifecycle Management Server 1.3 (x86_64) [New Version: 1.4.5 and 3.2.12]: rubygem-actionmailer-3_2-3.2.12-0.5.9 rubygem-actionpack-3_2-3.2.12-0.7.1 rubygem-activemodel-3_2-3.2.12-0.5.8 rubygem-activerecord-3_2-3.2.12-0.7.1 rubygem-activeresource-3_2-3.2.12-0.5.8 rubygem-activesupport-3_2-3.2.12-0.5.8 rubygem-rack-1_4-1.4.5-0.5.8 rubygem-rails-3_2-3.2.12-0.5.10 rubygem-railties-3_2-3.2.12-0.7.9 References: http://support.novell.com/security/cve/CVE-2013-1854.html https://bugzilla.novell.com/809932 https://bugzilla.novell.com/809935 https://bugzilla.novell.com/809940 http://download.novell.com/patch/finder/?keywords=fbe3a3e7096c7d4e58117c534e78345a From sle-security-updates at lists.suse.com Wed May 8 15:04:41 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 8 May 2013 23:04:41 +0200 (CEST) Subject: SUSE-SU-2013:0771-1: moderate: Security update for curl Message-ID: <20130508210441.34D1032269@maintenance.suse.de> SUSE Security Update: Security update for curl ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0771-1 Rating: moderate References: #814655 Cross-References: CVE-2013-1944 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update fixes the cookie domain tailmatch vulnerability in curl. CVE-2013-1944 has been assigned to this issue. Security Issue reference: * CVE-2013-1944 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-curl-7633 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-curl-7633 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-curl-7633 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-curl-7633 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libcurl-devel-7.19.7-1.20.25.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): curl-7.19.7-1.20.25.1 libcurl4-7.19.7-1.20.25.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): libcurl4-32bit-7.19.7-1.20.25.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): curl-7.19.7-1.20.25.1 libcurl4-7.19.7-1.20.25.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libcurl4-32bit-7.19.7-1.20.25.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): libcurl4-x86-7.19.7-1.20.25.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): curl-7.19.7-1.20.25.1 libcurl4-7.19.7-1.20.25.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libcurl4-32bit-7.19.7-1.20.25.1 References: http://support.novell.com/security/cve/CVE-2013-1944.html https://bugzilla.novell.com/814655 http://download.novell.com/patch/finder/?keywords=6c1f9db08bb6f79e066eb437be3c28d3 From sle-security-updates at lists.suse.com Wed May 8 15:04:45 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 8 May 2013 23:04:45 +0200 (CEST) Subject: SUSE-SU-2013:0772-1: moderate: Security update for compat-curl2 Message-ID: <20130508210445.ADAD432269@maintenance.suse.de> SUSE Security Update: Security update for compat-curl2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0772-1 Rating: moderate References: #742306 #810010 #814655 Cross-References: CVE-2013-1944 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that solves one vulnerability and has two fixes is now available. Description: This update of compat-curl2 fixes several security issues. * fixes for the cookie domain tailmatch vulnerability (bnc#814655) * updated curl CA-Cert Bundle (bnc#810010) * fixes for a potential BEAST attack (bnc#742306) Security Issue reference: * CVE-2013-1944 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): compat-curl2-7.11.0-20.9.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): compat-curl2-32bit-7.11.0-20.9.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): compat-curl2-x86-7.11.0-20.9.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): compat-curl2-64bit-7.11.0-20.9.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): compat-curl2-7.11.0-20.9.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): compat-curl2-32bit-7.11.0-20.9.1 References: http://support.novell.com/security/cve/CVE-2013-1944.html https://bugzilla.novell.com/742306 https://bugzilla.novell.com/810010 https://bugzilla.novell.com/814655 http://download.novell.com/patch/finder/?keywords=4dd1f084a8e5b92825d43c3c3d0a2326 From sle-security-updates at lists.suse.com Wed May 8 16:04:38 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 9 May 2013 00:04:38 +0200 (CEST) Subject: SUSE-SU-2013:0773-1: moderate: Security update for curl, curl Message-ID: <20130508220438.4CDC632269@maintenance.suse.de> SUSE Security Update: Security update for curl, curl ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0773-1 Rating: moderate References: #810010 #814655 Cross-References: CVE-2013-1944 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update fixes the cookie domain tailmatch vulnerability in curl. CVE-2013-1944 has been assigned to this issue. Also the CA-Cert Bundle has been updated to the current state. Security Issue reference: * CVE-2013-1944 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): curl-7.15.1-19.26.1 curl-devel-7.15.1-19.26.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): curl-32bit-7.15.1-19.26.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): curl-x86-7.15.1-19.26.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): curl-64bit-7.15.1-19.26.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): curl-7.15.1-19.26.1 curl-devel-7.15.1-19.26.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): curl-32bit-7.15.1-19.26.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): curl-devel-7.15.1-19.26.1 References: http://support.novell.com/security/cve/CVE-2013-1944.html https://bugzilla.novell.com/810010 https://bugzilla.novell.com/814655 http://download.novell.com/patch/finder/?keywords=2ccca265ff5a56f164062acebb540e5d From sle-security-updates at lists.suse.com Tue May 14 06:04:42 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 14 May 2013 14:04:42 +0200 (CEST) Subject: SUSE-SU-2013:0786-1: important: Security update for Linux kernel Message-ID: <20130514120442.64FDD32270@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0786-1 Rating: important References: #578046 #651219 #709266 #709269 #714604 #722398 #730117 #736149 #738210 #744692 #753371 #754583 #754898 #758040 #758243 #761849 #762424 #763494 #767612 #768052 #768470 #773577 #777616 #777746 #779577 #780977 #786150 #786814 #786900 #787821 #788826 #789235 #789311 #789359 #792674 #792793 #793139 #794513 #794529 #794805 #795269 #795957 #795961 #796412 #796418 #797042 #797175 #798921 #799197 #799209 #799270 #799578 #799926 #800280 #800701 #801038 #801178 #801713 #801717 #801720 #801782 #802153 #802353 #802445 #802712 #803056 #803067 #803394 #803674 #803712 #804154 #804220 #804609 #805823 #806138 #806273 #806395 #806404 #806431 #806466 #806469 #806492 #806631 #806825 #806847 #806908 #806976 #806980 #807431 #807517 #807560 #807853 #808166 #808307 #808829 #808966 #808991 #809155 #809166 #809375 #809493 #809748 #812281 #812315 #813963 #816443 #89359 Cross-References: CVE-2010-3873 CVE-2011-4131 CVE-2011-4604 CVE-2011-4622 CVE-2012-1601 CVE-2012-2119 CVE-2012-2137 CVE-2012-4461 CVE-2012-5517 CVE-2013-0160 CVE-2013-0216 CVE-2013-0231 CVE-2013-0871 CVE-2013-0913 CVE-2013-1767 CVE-2013-1774 CVE-2013-1796 CVE-2013-1797 CVE-2013-1798 CVE-2013-1848 Affected Products: SUSE Linux Enterprise Real Time 11 SP2 ______________________________________________________________________________ An update that solves 20 vulnerabilities and has 87 fixes is now available. It includes one version update. Description: The SUSE Linux Enterprise Server 11 SP2 Realtime kernel has been updated to 3.0.74 fixing various bugs and security issues. This update brings some features: * Updated HD-audio drivers for Nvidia/AMD HDMI and Haswell audio (FATE#314311 FATE#313695) * Lustre enablement patches were added (FATE#314679). * SGI UV (Ultraviolet) platform support. (FATE#306952) Security issues fixed in this update: * CVE-2013-0349: The hidp_setup_hid function in net/bluetooth/hidp/core.c in the Linux kernel did not properly copy a certain name field, which allowed local users to obtain sensitive information from kernel memory by setting a long name and making an HIDPCONNADD ioctl call. * CVE-2012-2137: Buffer overflow in virt/kvm/irq_comm.c in the KVM subsystem in the Linux kernel allowed local users to cause a denial of service (crash) and to possibly execute arbitrary code via vectors related to Message Signaled Interrupts (MSI), irq routing entries, and an incorrect check by the setup_routing_entry function before invoking the kvm_set_irq function. * CVE-2012-6549: The isofs_export_encode_fh function in fs/isofs/export.c in the Linux kernel did not initialize a certain structure member, which allowed local users to obtain sensitive information from kernel heap memory via a crafted application. * CVE-2012-6548: The udf_encode_fh function in fs/udf/namei.c in the Linux kernel did not initialize a certain structure member, which allowed local users to obtain sensitive information from kernel heap memory via a crafted application. * CVE-2013-0160: Timing side channel on attacks were possible on /dev/ptmx that could allow local attackers to predict keypresses like e.g. passwords. This has been fixed by not updating accessed/modified time on the pty devices. Note that this might break pty idle detection, so it might get reverted again. * CVE-2013-0216: The Xen netback functionality in the Linux kernel allowed guest OS users to cause a denial of service (loop) by triggering ring pointer corruption. * CVE-2013-0231: The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux allowed guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. * CVE-2013-0311: The translate_desc function in drivers/vhost/vhost.c in the Linux kernel did not properly handle cross-region descriptors, which allowed guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges. * CVE-2013-0913: Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel allowed local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition. * CVE-2013-0914: The flush_signal_handlers function in kernel/signal.c in the Linux kernel preserved the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application containing a sigaction system call. * CVE-2013-1767: Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel allowed local users to gain privileges or to cause a denial of service (system crash) by remounting a tmpfs filesystem without specifying a required mpol (aka mempolicy) mount option. * CVE-2013-1772: The log_prefix function in kernel/printk.c in the Linux kernel 3.x did not properly remove a prefix string from a syslog header, which allowed local users to cause a denial of service (buffer overflow and system crash) by leveraging /dev/kmsg write access and triggering a call_console_drivers function call. * CVE-2013-1774: The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) via an attempted /dev/ttyUSB read or write operation on a disconnected Edgeport USB serial converter. * CVE-2013-1792: Race condition in the install_user_keyrings function in security/keys/process_keys.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) via crafted keyctl system calls that trigger keyring operations in simultaneous threads. * CVE-2013-1796: The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel did not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allowed guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application. * CVE-2013-1797: Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel allowed guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation. * CVE-2013-1798: The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel did not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application. * CVE-2013-1848: fs/ext3/super.c in the Linux kernel used incorrect arguments to functions in certain circumstances related to printk input, which allowed local users to conduct format-string attacks and possibly gain privileges via a crafted application. * CVE-2013-1860: Heap-based buffer overflow in the wdm_in_callback function in drivers/usb/class/cdc-wdm.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (system crash) or to possibly execute arbitrary code via a crafted cdc-wdm USB device. * CVE-2013-2634: net/dcb/dcbnl.c in the Linux kernel did not initialize certain structures, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application. * CVE-2013-2635: The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain structure member, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application. * CVE-2013-0268: The msr_open function in arch/x86/kernel/msr.c in the Linux kernel allowed local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c. Bugs fixed in this update: BTRFS: * btrfs: do not try to notify udev about missing devices. * btrfs: add cancellation points to defrag. * btrfs: define BTRFS_MAGIC as a u64 value. * btrfs: make sure NODATACOW also gets NODATASUM set. * btrfs: enforce min_bytes parameter during extent allocation. * btrfs: build up error handling for merge_reloc_roots. * btrfs: free all recorded tree blocks on error . * btrfs: do not BUG_ON in prepare_to_reloc . * btrfs: do not BUG_ON on aborted situation . * btrfs: handle a bogus chunk tree nicely . * btrfs: do not drop path when printing out tree errors in scrub . * btrfs: make subvol creation/deletion killable in the early stages. * btrfs: abort unlink trans in missed error case. * btrfs: fix reada debug code compilation. * btrfs: return error when we specify wrong start to defrag. * btrfs: do not force pages under writeback to finish when aborting. USB: * USB: move usb_translate_errors to 1/usb (bnc#806908). * USB: add EOPNOTSUPP to usb_translate_errors (bnc#806908). * USB: cdc-wdm: sanitize error returns (bnc#806908). * USB: cdc-wdm: cleanup error codes (bnc#806908). * USB: cdc-wdm: add helper to preserve kABI (bnc#806908). * USB: Do not use EHCI port sempahore for USB 3.0 hubs (bnc#807560). * USB: Prepare for refactoring by adding extra udev checks (bnc#807560). * USB: Rip out recursive call on warm port reset (bnc#807560). * USB: Fix connected device switch to Inactive state (bnc#807560). * USB: modify hub to detect unplugs in all states (bnc#807560). * USB: io_ti: Fix NULL dereference in chase_port() (bnc#806976, CVE-2013-1774). * USB: cdc-wdm: fix buffer overflow (bnc#806431). * USB: cdc-wdm: cannot use dev_printk when device is gone (bnc#806469). * USB: cdc-wdm: fix memory leak (bnc#806466). * elousb: really long delays for broken devices (bnc#795269). * xhci: Fix conditional check in bandwidth calculation (bnc#795961). * xHCI: Fix TD Size calculation on 1.0 hosts (bnc#795957). * xhci: avoid dead ports, add roothub port polling (bnc#799197). * USB: Handle warm reset failure on empty port (bnc#799926). * USB: Ignore port state until reset completes (bnc#799926). * Allow USB 3.0 ports to be disabled (bnc#799926). * USB: Ignore xHCI Reset Device status (bnc#799926). * USB: Handle auto-transition from hot to warm reset (bnc#799926). S/390: * ipl: Implement diag308 loop for zfcpdump (bnc#801720, LTC#88197). * zcore: Add hsa file (bnc#801720, LTC#88198). * kernel: support physical memory > 4TB (bnc#801720, LTC#88787). * mm: Fix crst upgrade of mmap with MAP_FIXED (bnc#801720, LTC#88797). * Update patches.suse/zcrypt-feed-hwrandom (bnc#806825). Allow zcrypt module unload even when the thread is blocked writing to a full random pool. * dca: check against empty dca_domains list before unregister provider fix. * s390/kvm: Fix store status for ACRS/FPRS fix. * series.conf: disabled patches.arch/s390-64-03-kernel-inc-phys-mem.patch due to excessive kabi break. (bnc#801720) ALSA: * patches.drivers/alsa-sp3-pre-695-Yet-another-fix-for-broken- HSW-HDMI-pin: Refresh. Fix the invalid PCI SSID check (bnc#806404) * ALSA: hda - Support mute LED on HP AiO buttons (bnc#808991). * ALSA: hda: Allow multple SPDIF controls per codec (bnc#780977). * ALSA: hda: Virtualize SPDIF out controls (bnc#780977). * ALSA: hda: Separate generic and non-generic implementations. * ALSA: hda: hdmi_eld_update_pcm_info: update a stream in place. * ALSA: hda: HDMI: Support codecs with fewer cvts than pins. * ALSA: hda - Add snd_hda_get_conn_list() helper function. * ALSA: hda - Add snd_hda_override_conn_list() helper function. * ALSA: hda - Increase the max number of coverters/pins in patch_hdmi.c (bnc#780977). * ALSA: hda - Check non-snoop in a single place (bnc#801713). * ALSA: HDA: Use LPIB Position fix for Intel SCH Poulsbo (bnc#801713). * ALSA: hda_intel: Add Oaktrail identifiers (bnc#801713). * ALSA: HDA: Use LPIB position fix for Oaktrail (bnc#801713). * ALSA: hda - add id for Atom Cedar Trail HDMI codec (bnc#801713). * ALSA: hda - Fix detection of Creative SoundCore3D controllers (bnc#762424). * ALSA: hda - add power states information in proc (bnc#801713). * ALSA: hda - Show D3cold state in proc files (bnc#801713). * ALSA: hda - check supported power states (bnc#801713). * ALSA: hda - reduce msleep time if EPSS power states supported (bnc#801713). * ALSA: hda - check proper return value (bnc#801713). * ALSA: hda - power setting error check (bnc#801713). * ALSA: hda - Add DeviceID for Haswell HDA (bnc#801713). * ALSA: hda - add Haswell HDMI codec id (bnc#801713). * ALSA: hda - Fix driver type of Haswell controller to AZX_DRIVER_SCH. * ALSA: hda - Add new GPU codec ID to snd-hda (bnc#780977). * ALSA: HDMI - Fix channel_allocation array wrong order (bnc#801713). * ALSA: hda - Avoid BDL position workaround when no_period_wakeup is set (bnc#801713). * ALSA: hda - Allow to pass position_fix=0 explicitly (bnc#801713). * ALSA: hda - Add another pci id for Haswell board. * ALSA: hda - force use of SSYNC bits (bnc#801713). * ALSA: hda - use LPIB for delay estimation (bnc#801713). * ALSA: hda - add PCI identifier for Intel 5 Series/3400 (bnc#801713). * ALSA: hda - Add workaround for conflicting IEC958 controls (FATE#314311). * ALSA: hda - Stop LPIB delay counting on broken hardware (FATE#313695). * ALSA: hda - Always turn on pins for HDMI/DP (FATE#313695). * ALSA: hda - bug fix for invalid connection list of Haswell HDMI codec pins (FATE#313695). * ALSA - HDA: New PCI ID for Haswell ULT (bnc#801713). * ALSA: hda - Release assigned pin/cvt at error path of hdmi_pcm_open() (bnc#801713). * ALSA: hda - Support rereading widgets under the function group (bnc#801713). * ALSA: hda - Add fixup for Haswell to enable all pin and convertor widgets (bnc#801713). * ALSA: hda - Yet another fix for broken HSW HDMI pin connections (bnc#801713). * patches.kabi/alsa-spdif-update-kabi-fixes: Fix kABI breakage due to HD-audio HDMI updates (bnc#780977). * ALSA: hda - Fix non-snoop page handling (bnc#800701). * ALSA: hda - Apply mic-mute LED fixup for new HP laptops (bnc#796418). * patches.drivers/alsa-sp3-pre-695-Yet-another-fix-for-broken- HSW-HDMI-pin: Refresh. Fix a superfluous incremental leading to the double array size (bnc#808966) XEN: * pciback: notify hypervisor about devices intended to be assigned to guests. * patches.xen/xen-clockevents: Update (bnc#803712). * patches.xen/xen-ipi-per-cpu-irq: Update (bnc#803712). * patches.xen/xen3-patch-2.6.19: Update (bnc#809166). * Update Xen patches to 3.0.68. * Update Xen patches to 3.0.63. * netback: fix netbk_count_requests(). * x86/mm: Check if PUD is large when validating a kerneladdress (bnc#794805). OTHER: * Revert dmi_scan: fix missing check for _DMI_ signature in smbios_present(). * Revert drivers/firmware/dmi_scan.c: fetch dmi version from SMBIOS if it exists. * Revert drivers/firmware/dmi_scan.c: check dmi version when get system uuid. * sysfs: Revert sysfs: fix race between readdir and lseek (bnc#816443). * 8021q: Revert 8021q: fix a potential use-after-free. * /dev/urandom returning EOF: trim down revert to not change kabi. (bnc#789359). * tun: reserves space for network in skb (bnc#803394). * Fixed /dev/urandom returning EOF (bnc#789359). * mm: Make snapshotting pages for stable writes a per-bio operation * fs: Only enable stable page writes when necessary (bnc#807517). * patches.drivers/ixgbe-Address-fact-that-RSC-was-not-setting- GSO-size.patch: Fix bnc#802712 * Fix build error without CONFIG_BOOTSPLASH * Fix bootsplash breakage due to 3.0.67 stable fix (bnc#813963) * drivers/base/memory.c: fix memory_dev_init() long delay (bnc#804609). * mtd: drop physmap_configure (bnc#809375). * Bluetooth: btusb: hide more usb_submit_urb errors (bnc#812281). * o2dlm: fix NULL pointer dereference in o2dlm_blocking_ast_wrapper (bnc#806492) * qeth: fix qeth_wait_for_threads() deadlock for OSN devices (bnc#812315, LTC#90910). * Fix NULL pointer dereference in o2dlm_blocking_ast_wrapper (bnc#806492) * mm: fix ALLOC_WMARK_MASK check (bnc#808166) * pciehp: Fix dmi match table definition and missing space in printk (bnc#796412). * fnic: Fix SGEs limit (bnc#807431). * pciehp: Ignore missing surprise bit on some hosts (bnc#796412). * ipv6: Queue fragments per interface for multicast/link-local addresses (bnc#804220). * netfilter: send ICMPv6 message on fragment reassembly timeout (bnc#773577). * netfilter: fix sending ICMPv6 on netfilter reassembly timeout (bnc#773577). * jbd: clear revoked flag on buffers before a new transaction started (bnc#806395). * xfrm6: count extension headers into payload length (bnc#794513). * mm: page_alloc: Avoid marking zones full prematurely after zone_reclaim() (Evict inactive pages when zone_reclaim is enabled (bnc#808166)). * st: Take additional queue ref in st_probe (bnc#801038, bnc#788826). * drivers: xhci: fix incorrect bit test (bnc#714604). * xfrm: remove unused xfrm4_policy_fini() (bnc#801717). * xfrm: make gc_thresh configurable in all namespaces (bnc#801717). * kabi: use net_generic to avoid changes in struct net (bnc#801717). * xfs: Fix WARN_ON(delalloc) in xfs_vm_releasepage() (bnc#806631). * patches.drivers/alsa-sp2-hda-033-Support-mute-LED-on-HP-AiO- buttons: Refresh tags. * block: use i_size_write() in bd_set_size() (bnc#809748). * loopdev: fix a deadlock (bnc#809748). * patches.suse/supported-flag: fix mis-reported supported status (bnc#809493). * patches.suse/supported-flag-enterprise: Refresh. * KVM: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache_init (bnc#806980 CVE-2013-1797). * KVM: Fix bounds checking in ioapic indirect register read (bnc#806980 CVE-2013-1798). * KVM: Fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (bnc#806980 CVE-2013-1796). * KVM: introduce kvm_read_guest_cached (bnc#806980). * x86/numa: Add constraints check for nid parameters (Cope with negative SRAT distances (bnc#807853)). * drm/i915: Periodically sanity check power management (bnc#808307). * drm/i915: bounds check execbuffer relocation count (bnc#808829,CVE-2013-0913). * ext3: Fix format string issues (bnc#809155, CVE-2013-1848). * x86-64: Fix memset() to support sizes of 4Gb and above (Properly initialise memmap on large machines (bnc#802353)). * bdi: allow block devices to say that they require stable page writes * mm: only enforce stable page writes if the backing device requires it * block: optionally snapshot page contents to provide stable pages during write * 9pfs: fix filesystem to wait for stable page writeback * ocfs2: wait for page writeback to provide stable pages * ubifs: wait for page writeback to provide stable pages * Only enable stable page writes when required by underlying BDI (bnc#807517). * KVM: emulator: drop RPL check from linearize() function (bnc#754583). * mlx4: Correct calls to to_ib_ah_attr() (bnc#806847). * DRM/i915: On G45 enable cursor plane briefly after enabling the display plane (bnc #753371) [backported from drm-intel-fixes]. * cxgb4i: Remove the scsi host device when removing device (bnc#722398) * xprtrdma: The transport should not bug-check when a dup reply is received (bnc#763494). * tmpfs: fix use-after-free of mempolicy object (bnc#806138, CVE-2013-1767). * lpfc: Check fc_block_scsi_eh return value correctly for lpfc_abort_handler (bnc#803674). * md: fix bug in handling of new_data_offset (bnc#805823). * md: Avoid OOPS when reshaping raid1 to raid0 (Useful OOPS fix). * md: fix two bugs when attempting to resize RAID0 array (Useful BUG() fix). * md: raid0: fix error return from create_stripe_zones (useful bug fix). * ext4: add missing kfree() on error return path in add_new_gdb(). * ext4: Free resources in some error path in ext4_fill_super. * intel_idle: support Haswell (fate#313720). * hp_accel: Add a new PnP ID HPQ6007 for new HP laptops (bnc#802445). * nfs: Ensure NFS does not block on dead server during unmount (bnc#794529). * block: disable discard request merge temporarily (bnc#803067). * mm: mmu_notifier: have mmu_notifiers use a global SRCU so they may safely schedule * mm: mmu_notifier: make the mmu_notifier srcu static * mmu_notifier_unregister NULL Pointer deref and multiple ->release() callouts * Have mmu_notifiers use SRCU so they may safely schedule kabi compatability * patches.fixes/Have-mmu_notifiers-use-SRCU-so-they-may-safely -schedule.patch: * patches.fixes/Have-mmu_notifiers-use-SRCU-so-they-may-safely -schedule-build-fix.patch: Delete, replace with upstream equivalent and add KABI workaround (bnc#578046, bnc#786814, FATE#306952). * ipv6: Do not send packet to big messages to self (bnc#786150). * hpwdt: Unregister NMI events on exit (bnc#777746). * x86/mm: Check if PUD is large when validating a kernel address (bnc#794805). * ata: Fix DVD not dectected at some Haswell platforms (bnc#792674). * Avoid softlockups in printk (bnc#744692, bnc#789311). * Do not pack credentials for dying processes (bnc#779577, bnc#803056). * xfs: punch new delalloc blocks out of failed writes inside EOF (bnc#761849). * xfs: xfs_sync_data is redundant (bnc#761849). * Add GPIO support for Intel Centerton SOC (bnc#792793). * Add Multifunction Device support for Intel Centerton SOC (bnc#792793). * Add Intel Legacy Block support for Intel Centerton SOC (bnc#792793). * mm: net: Allow some !SOCK_MEMALLOC traffic through even if skb_pfmemalloc (Allow GPFS network traffic despite PF_MEMALLOC misuse (bnc#786900)). * kernel/resource.c: fix stack overflow in __reserve_region_with_split() (bnc#801782). * Lustre enablement patches * block: add dev_check_rdonly and friends for Lustre testing (FATE#314679). * dcache: Add DCACHE_LUSTRE_INVALID flag for Lustre to handle its own invalidation (FATE#314679). * lsm: export security_inode_unlink (FATE#315679). * lustre: Add lustre kernel version (FATE#314679). * st: fix memory leak with >1MB tape I/O (bnc#798921). * cifs: lower default wsize when 1 extensions are not used (bnc#799578). * ata_generic: Skip is_intel_ider() check when ata_generic=1 is set (bnc#777616). * quota: autoload the quota_v2 module for QFMT_VFS_V1 quota format (bnc#802153). * xen: properly bound buffer access when parsing cpu/availability. * netback: shutdown the ring if it contains garbage (CVE-2013-0216 XSA-39 bnc#800280). * netback: correct netbk_tx_err() to handle wrap around (CVE-2013-0216 XSA-39 bnc#800280). * pciback: rate limit error message from pciback_enable_msi() (CVE-2013-0231 XSA-43 bnc#801178). * scsiback/usbback: move cond_resched() invocations to proper place. * drm/i915: Implement workaround for broken CS tlb on i830/845 (bnc #758040). * drivers: scsi: storvsc: Initialize the sglist. * e1000e: 82571 Fix Tx Data Corruption during Tx hang recovery (bnc#790867). * KVM: Fix buffer overflow in kvm_set_irq() (bnc#767612 CVE-2012-2137). * mm: compaction: Abort async compaction if locks are contended or taking too long. * mm: compaction: abort compaction loop if lock is contended or run too long. * mm: compaction: acquire the zone->lock as late as possible. * mm: compaction: acquire the zone->lru_lock as late as possible. * mm: compaction: move fatal signal check out of compact_checklock_irqsave. Reduce LRU and zone lock contention when compacting memory for THP (bnc#796823). Security Issue references: * CVE-2012-6548 * CVE-2012-6549 * CVE-2012-2137 * CVE-2013-0160 * CVE-2013-0216 * CVE-2013-0231 * CVE-2013-0913 * CVE-2013-0914 * CVE-2013-1767 * CVE-2013-1774 * CVE-2013-1796 * CVE-2013-1797 * CVE-2013-1798 * CVE-2013-1848 * CVE-2013-1860 * CVE-2013-2634 * CVE-2013-2635 * CVE-2013-1792 * CVE-2013-0311 * CVE-2013-1772 * CVE-2013-0268 * CVE-2013-0349 Indications: Everyone using the Real Time Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Real Time 11 SP2: zypper in -t patch slertesp2-kernel-7695 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Real Time 11 SP2 (x86_64) [New Version: 3.0.74.rt98]: cluster-network-kmp-rt-1.4_3.0.74_rt98_0.6.2-2.18.37 cluster-network-kmp-rt_trace-1.4_3.0.74_rt98_0.6.2-2.18.37 drbd-kmp-rt-8.4.2_3.0.74_rt98_0.6.2-0.6.6.28 drbd-kmp-rt_trace-8.4.2_3.0.74_rt98_0.6.2-0.6.6.28 iscsitarget-kmp-rt-1.4.20_3.0.74_rt98_0.6.2-0.23.34 iscsitarget-kmp-rt_trace-1.4.20_3.0.74_rt98_0.6.2-0.23.34 kernel-rt-3.0.74.rt98-0.6.2.1 kernel-rt-base-3.0.74.rt98-0.6.2.1 kernel-rt-devel-3.0.74.rt98-0.6.2.1 kernel-rt_trace-3.0.74.rt98-0.6.2.1 kernel-rt_trace-base-3.0.74.rt98-0.6.2.1 kernel-rt_trace-devel-3.0.74.rt98-0.6.2.1 kernel-source-rt-3.0.74.rt98-0.6.2.1 kernel-syms-rt-3.0.74.rt98-0.6.2.1 lttng-modules-kmp-rt-2.0.4_3.0.74_rt98_0.6.2-0.7.30 lttng-modules-kmp-rt_trace-2.0.4_3.0.74_rt98_0.6.2-0.7.30 ocfs2-kmp-rt-1.6_3.0.74_rt98_0.6.2-0.11.36 ocfs2-kmp-rt_trace-1.6_3.0.74_rt98_0.6.2-0.11.36 ofed-kmp-rt-1.5.2_3.0.74_rt98_0.6.2-0.28.28.8 ofed-kmp-rt_trace-1.5.2_3.0.74_rt98_0.6.2-0.28.28.8 References: http://support.novell.com/security/cve/CVE-2010-3873.html http://support.novell.com/security/cve/CVE-2011-4131.html http://support.novell.com/security/cve/CVE-2011-4604.html http://support.novell.com/security/cve/CVE-2011-4622.html http://support.novell.com/security/cve/CVE-2012-1601.html http://support.novell.com/security/cve/CVE-2012-2119.html http://support.novell.com/security/cve/CVE-2012-2137.html http://support.novell.com/security/cve/CVE-2012-4461.html http://support.novell.com/security/cve/CVE-2012-5517.html http://support.novell.com/security/cve/CVE-2013-0160.html http://support.novell.com/security/cve/CVE-2013-0216.html http://support.novell.com/security/cve/CVE-2013-0231.html http://support.novell.com/security/cve/CVE-2013-0871.html http://support.novell.com/security/cve/CVE-2013-0913.html http://support.novell.com/security/cve/CVE-2013-1767.html http://support.novell.com/security/cve/CVE-2013-1774.html http://support.novell.com/security/cve/CVE-2013-1796.html http://support.novell.com/security/cve/CVE-2013-1797.html http://support.novell.com/security/cve/CVE-2013-1798.html http://support.novell.com/security/cve/CVE-2013-1848.html https://bugzilla.novell.com/578046 https://bugzilla.novell.com/651219 https://bugzilla.novell.com/709266 https://bugzilla.novell.com/709269 https://bugzilla.novell.com/714604 https://bugzilla.novell.com/722398 https://bugzilla.novell.com/730117 https://bugzilla.novell.com/736149 https://bugzilla.novell.com/738210 https://bugzilla.novell.com/744692 https://bugzilla.novell.com/753371 https://bugzilla.novell.com/754583 https://bugzilla.novell.com/754898 https://bugzilla.novell.com/758040 https://bugzilla.novell.com/758243 https://bugzilla.novell.com/761849 https://bugzilla.novell.com/762424 https://bugzilla.novell.com/763494 https://bugzilla.novell.com/767612 https://bugzilla.novell.com/768052 https://bugzilla.novell.com/768470 https://bugzilla.novell.com/773577 https://bugzilla.novell.com/777616 https://bugzilla.novell.com/777746 https://bugzilla.novell.com/779577 https://bugzilla.novell.com/780977 https://bugzilla.novell.com/786150 https://bugzilla.novell.com/786814 https://bugzilla.novell.com/786900 https://bugzilla.novell.com/787821 https://bugzilla.novell.com/788826 https://bugzilla.novell.com/789235 https://bugzilla.novell.com/789311 https://bugzilla.novell.com/789359 https://bugzilla.novell.com/792674 https://bugzilla.novell.com/792793 https://bugzilla.novell.com/793139 https://bugzilla.novell.com/794513 https://bugzilla.novell.com/794529 https://bugzilla.novell.com/794805 https://bugzilla.novell.com/795269 https://bugzilla.novell.com/795957 https://bugzilla.novell.com/795961 https://bugzilla.novell.com/796412 https://bugzilla.novell.com/796418 https://bugzilla.novell.com/797042 https://bugzilla.novell.com/797175 https://bugzilla.novell.com/798921 https://bugzilla.novell.com/799197 https://bugzilla.novell.com/799209 https://bugzilla.novell.com/799270 https://bugzilla.novell.com/799578 https://bugzilla.novell.com/799926 https://bugzilla.novell.com/800280 https://bugzilla.novell.com/800701 https://bugzilla.novell.com/801038 https://bugzilla.novell.com/801178 https://bugzilla.novell.com/801713 https://bugzilla.novell.com/801717 https://bugzilla.novell.com/801720 https://bugzilla.novell.com/801782 https://bugzilla.novell.com/802153 https://bugzilla.novell.com/802353 https://bugzilla.novell.com/802445 https://bugzilla.novell.com/802712 https://bugzilla.novell.com/803056 https://bugzilla.novell.com/803067 https://bugzilla.novell.com/803394 https://bugzilla.novell.com/803674 https://bugzilla.novell.com/803712 https://bugzilla.novell.com/804154 https://bugzilla.novell.com/804220 https://bugzilla.novell.com/804609 https://bugzilla.novell.com/805823 https://bugzilla.novell.com/806138 https://bugzilla.novell.com/806273 https://bugzilla.novell.com/806395 https://bugzilla.novell.com/806404 https://bugzilla.novell.com/806431 https://bugzilla.novell.com/806466 https://bugzilla.novell.com/806469 https://bugzilla.novell.com/806492 https://bugzilla.novell.com/806631 https://bugzilla.novell.com/806825 https://bugzilla.novell.com/806847 https://bugzilla.novell.com/806908 https://bugzilla.novell.com/806976 https://bugzilla.novell.com/806980 https://bugzilla.novell.com/807431 https://bugzilla.novell.com/807517 https://bugzilla.novell.com/807560 https://bugzilla.novell.com/807853 https://bugzilla.novell.com/808166 https://bugzilla.novell.com/808307 https://bugzilla.novell.com/808829 https://bugzilla.novell.com/808966 https://bugzilla.novell.com/808991 https://bugzilla.novell.com/809155 https://bugzilla.novell.com/809166 https://bugzilla.novell.com/809375 https://bugzilla.novell.com/809493 https://bugzilla.novell.com/809748 https://bugzilla.novell.com/812281 https://bugzilla.novell.com/812315 https://bugzilla.novell.com/813963 https://bugzilla.novell.com/816443 https://bugzilla.novell.com/89359 http://download.novell.com/patch/finder/?keywords=d2f8c0b58837ded577fa1f4a7a342e3f From sle-security-updates at lists.suse.com Wed May 15 14:04:21 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 15 May 2013 22:04:21 +0200 (CEST) Subject: SUSE-SU-2013:0793-1: Security update for sudo Message-ID: <20130515200421.D925732274@maintenance.suse.de> SUSE Security Update: Security update for sudo ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0793-1 Rating: low References: #806919 #806921 #817349 #817350 Cross-References: CVE-2013-1775 CVE-2013-1776 CVE-2013-2776 CVE-2013-2777 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update fixes the following security issues which allowed to bypass the sudo authentication: CVE-2013-1775, CVE-2013-1776, CVE-2013-2776 and CVE-2013-2777. Security Issue references: * CVE-2013-1775 * CVE-2013-1776 * CVE-2013-2776 * CVE-2013-2777 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-sudo-7705 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-sudo-7705 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-sudo-7705 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): sudo-1.7.6p2-0.2.12.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): sudo-1.7.6p2-0.2.12.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): sudo-1.6.9p23-0.18.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): sudo-1.7.6p2-0.2.12.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): sudo-1.6.9p23-0.18.1 References: http://support.novell.com/security/cve/CVE-2013-1775.html http://support.novell.com/security/cve/CVE-2013-1776.html http://support.novell.com/security/cve/CVE-2013-2776.html http://support.novell.com/security/cve/CVE-2013-2777.html https://bugzilla.novell.com/806919 https://bugzilla.novell.com/806921 https://bugzilla.novell.com/817349 https://bugzilla.novell.com/817350 http://download.novell.com/patch/finder/?keywords=184db1a9bc0b457123335ef7cfb9894f http://download.novell.com/patch/finder/?keywords=68356be24d3ee0305b115b7f77e08946 From sle-security-updates at lists.suse.com Wed May 15 14:04:29 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 15 May 2013 22:04:29 +0200 (CEST) Subject: SUSE-SU-2013:0795-1: moderate: Security update for libtiff Message-ID: <20130515200429.B690D32255@maintenance.suse.de> SUSE Security Update: Security update for libtiff ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0795-1 Rating: moderate References: #817573 #818117 Cross-References: CVE-2013-1960 CVE-2013-1961 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update fixes two buffer overflow security issues with libtiff: * CVE-2013-1960 * CVE-2013-1961 Security Issue references: * CVE-2013-1960 * CVE-2013-1961 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-libtiff-devel-7707 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-libtiff-devel-7707 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-libtiff-devel-7707 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-libtiff-devel-7707 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): libtiff-devel-3.8.2-141.152.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64): libtiff-devel-32bit-3.8.2-141.152.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): libtiff3-3.8.2-141.152.1 tiff-3.8.2-141.152.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): libtiff3-32bit-3.8.2-141.152.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): libtiff3-3.8.2-141.152.1 tiff-3.8.2-141.152.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64): libtiff3-32bit-3.8.2-141.152.1 - SUSE Linux Enterprise Server 11 SP2 (ia64): libtiff3-x86-3.8.2-141.152.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): libtiff-3.8.2-5.34.1 libtiff-devel-3.8.2-5.34.1 tiff-3.8.2-5.34.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): libtiff-32bit-3.8.2-5.34.1 libtiff-devel-32bit-3.8.2-5.34.1 - SUSE Linux Enterprise Server 10 SP4 (ia64): libtiff-x86-3.8.2-5.34.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): libtiff-64bit-3.8.2-5.34.1 libtiff-devel-64bit-3.8.2-5.34.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): libtiff3-3.8.2-141.152.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): libtiff3-32bit-3.8.2-141.152.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): libtiff-3.8.2-5.34.1 libtiff-devel-3.8.2-5.34.1 tiff-3.8.2-5.34.1 - SUSE Linux Enterprise Desktop 10 SP4 (x86_64): libtiff-32bit-3.8.2-5.34.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): libtiff-devel-3.8.2-5.34.1 - SLE SDK 10 SP4 (s390x x86_64): libtiff-devel-32bit-3.8.2-5.34.1 - SLE SDK 10 SP4 (ppc): libtiff-devel-64bit-3.8.2-5.34.1 References: http://support.novell.com/security/cve/CVE-2013-1960.html http://support.novell.com/security/cve/CVE-2013-1961.html https://bugzilla.novell.com/817573 https://bugzilla.novell.com/818117 http://download.novell.com/patch/finder/?keywords=2281c07d506043b014b0b2aa06f2d47f http://download.novell.com/patch/finder/?keywords=7ec0732ff5c7ebf5edea88ea24721440 From sle-security-updates at lists.suse.com Thu May 16 18:04:09 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 17 May 2013 02:04:09 +0200 (CEST) Subject: SUSE-SU-2013:0798-1: important: Security update for flash-player Message-ID: <20130517000409.C0B3C32277@maintenance.suse.de> SUSE Security Update: Security update for flash-player ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0798-1 Rating: important References: #819916 Cross-References: CVE-2013-2728 CVE-2013-3324 CVE-2013-3325 CVE-2013-3326 CVE-2013-3327 CVE-2013-3328 CVE-2013-3329 CVE-2013-3330 CVE-2013-3331 CVE-2013-3332 CVE-2013-3333 CVE-2013-3334 CVE-2013-3335 Affected Products: SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes 13 vulnerabilities is now available. It includes one version update. Description: Adobe flash-player has been updated to 11.2.202.285 security update, which fixes various remote code execution problems and other security issues. Some more details can be found on: https://www.adobe.com/support/security/bulletins/apsb13-14.h tml Security Issue references: * CVE-2013-2728 * CVE-2013-3324 * CVE-2013-3325 * CVE-2013-3326 * CVE-2013-3327 * CVE-2013-3328 * CVE-2013-3329 * CVE-2013-3330 * CVE-2013-3331 * CVE-2013-3332 * CVE-2013-3333 * CVE-2013-3334 * CVE-2013-3335 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-flash-player-7720 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 11.2.202.285]: flash-player-11.2.202.285-0.3.1 flash-player-gnome-11.2.202.285-0.3.1 flash-player-kde4-11.2.202.285-0.3.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 11.2.202.285]: flash-player-11.2.202.285-0.5.1 References: http://support.novell.com/security/cve/CVE-2013-2728.html http://support.novell.com/security/cve/CVE-2013-3324.html http://support.novell.com/security/cve/CVE-2013-3325.html http://support.novell.com/security/cve/CVE-2013-3326.html http://support.novell.com/security/cve/CVE-2013-3327.html http://support.novell.com/security/cve/CVE-2013-3328.html http://support.novell.com/security/cve/CVE-2013-3329.html http://support.novell.com/security/cve/CVE-2013-3330.html http://support.novell.com/security/cve/CVE-2013-3331.html http://support.novell.com/security/cve/CVE-2013-3332.html http://support.novell.com/security/cve/CVE-2013-3333.html http://support.novell.com/security/cve/CVE-2013-3334.html http://support.novell.com/security/cve/CVE-2013-3335.html https://bugzilla.novell.com/819916 http://download.novell.com/patch/finder/?keywords=460e0e068724ce3d5f1345bed40fcfc1 http://download.novell.com/patch/finder/?keywords=a5fa8585bb27b34c11c4dca03b7743de From sle-security-updates at lists.suse.com Fri May 17 16:04:54 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 18 May 2013 00:04:54 +0200 (CEST) Subject: SUSE-SU-2013:0809-1: important: Security update for Acrobat Reader Message-ID: <20130517220454.1E3943227A@maintenance.suse.de> SUSE Security Update: Security update for Acrobat Reader ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0809-1 Rating: important References: #819918 Cross-References: CVE-2013-2549 CVE-2013-2550 CVE-2013-2718 CVE-2013-2719 CVE-2013-2720 CVE-2013-2721 CVE-2013-2722 CVE-2013-2723 CVE-2013-2724 CVE-2013-2725 CVE-2013-2726 CVE-2013-2727 CVE-2013-2729 CVE-2013-2730 CVE-2013-2731 CVE-2013-2732 CVE-2013-2733 CVE-2013-2734 CVE-2013-2735 CVE-2013-2736 CVE-2013-2737 CVE-2013-3337 CVE-2013-3338 CVE-2013-3339 CVE-2013-3340 CVE-2013-3341 CVE-2013-3342 Affected Products: SUSE Linux Enterprise Desktop 11 SP2 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes 27 vulnerabilities is now available. It includes two new package versions. Description: Acrobat Reader has been updated to version 9.5.5. The Adobe Advisory can be found at: https://www.adobe.com/support/security/bulletins/apsb13-15.h tml These updates resolve: * memory corruption vulnerabilities that could lead to code execution (CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, CVE-2013-3341). * an integer underflow vulnerability that could lead to code execution (CVE-2013-2549). * a use-after-free vulnerability that could lead to a bypass of Adobe Reader's sandbox protection (CVE-2013-2550). * an information leakage issue involving a Javascript API (CVE-2013-2737). * a stack overflow vulnerability that could lead to code execution (CVE-2013-2724). * buffer overflow vulnerabilities that could lead to code execution (CVE-2013-2730, CVE-2013-2733). * integer overflow vulnerabilities that could lead to code execution (CVE-2013-2727, CVE-2013-2729). * a flaw in the way Reader handles domains that have been blacklisted in the operating system (CVE-2013-3342). Security Issue references: * CVE-2013-2549 * CVE-2013-2550 * CVE-2013-2718 * CVE-2013-2719 * CVE-2013-2720 * CVE-2013-2721 * CVE-2013-2722 * CVE-2013-2723 * CVE-2013-2724 * CVE-2013-2725 * CVE-2013-2726 * CVE-2013-2727 * CVE-2013-2729 * CVE-2013-2730 * CVE-2013-2731 * CVE-2013-2732 * CVE-2013-2733 * CVE-2013-2734 * CVE-2013-2735 * CVE-2013-2736 * CVE-2013-2737 * CVE-2013-3337 * CVE-2013-3338 * CVE-2013-3339 * CVE-2013-3340 * CVE-2013-3341 * CVE-2013-3342 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-acroread-7734 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (noarch): acroread-cmaps-9.4.6-0.4.3.2 acroread-fonts-ja-9.4.6-0.4.3.2 acroread-fonts-ko-9.4.6-0.4.3.2 acroread-fonts-zh_CN-9.4.6-0.4.3.2 acroread-fonts-zh_TW-9.4.6-0.4.3.2 - SUSE Linux Enterprise Desktop 11 SP2 (i586) [New Version: 9.5.5]: acroread-9.5.5-0.3.1 - SUSE Linux Enterprise Desktop 10 SP4 (noarch) [New Version: 9.4.6]: acroread-cmaps-9.4.6-0.6.63 acroread-fonts-ja-9.4.6-0.6.63 acroread-fonts-ko-9.4.6-0.6.63 acroread-fonts-zh_CN-9.4.6-0.6.63 acroread-fonts-zh_TW-9.4.6-0.6.63 - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 9.5.5]: acroread-9.5.5-0.6.1 References: http://support.novell.com/security/cve/CVE-2013-2549.html http://support.novell.com/security/cve/CVE-2013-2550.html http://support.novell.com/security/cve/CVE-2013-2718.html http://support.novell.com/security/cve/CVE-2013-2719.html http://support.novell.com/security/cve/CVE-2013-2720.html http://support.novell.com/security/cve/CVE-2013-2721.html http://support.novell.com/security/cve/CVE-2013-2722.html http://support.novell.com/security/cve/CVE-2013-2723.html http://support.novell.com/security/cve/CVE-2013-2724.html http://support.novell.com/security/cve/CVE-2013-2725.html http://support.novell.com/security/cve/CVE-2013-2726.html http://support.novell.com/security/cve/CVE-2013-2727.html http://support.novell.com/security/cve/CVE-2013-2729.html http://support.novell.com/security/cve/CVE-2013-2730.html http://support.novell.com/security/cve/CVE-2013-2731.html http://support.novell.com/security/cve/CVE-2013-2732.html http://support.novell.com/security/cve/CVE-2013-2733.html http://support.novell.com/security/cve/CVE-2013-2734.html http://support.novell.com/security/cve/CVE-2013-2735.html http://support.novell.com/security/cve/CVE-2013-2736.html http://support.novell.com/security/cve/CVE-2013-2737.html http://support.novell.com/security/cve/CVE-2013-3337.html http://support.novell.com/security/cve/CVE-2013-3338.html http://support.novell.com/security/cve/CVE-2013-3339.html http://support.novell.com/security/cve/CVE-2013-3340.html http://support.novell.com/security/cve/CVE-2013-3341.html http://support.novell.com/security/cve/CVE-2013-3342.html https://bugzilla.novell.com/819918 http://download.novell.com/patch/finder/?keywords=58cafced3fc6f05d61997a857a3e59ba http://download.novell.com/patch/finder/?keywords=771b7d069a8e369062487e3b94acb033 From sle-security-updates at lists.suse.com Fri May 17 17:04:23 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 18 May 2013 01:04:23 +0200 (CEST) Subject: SUSE-SU-2013:0810-1: important: Security update for oracle-update Message-ID: <20130517230423.DC2FD32269@maintenance.suse.de> SUSE Security Update: Security update for oracle-update ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0810-1 Rating: important References: #776005 #816221 #818773 Cross-References: CVE-2013-1519 CVE-2013-1534 CVE-2013-1538 CVE-2013-1554 Affected Products: SUSE Manager 1.7 for SLE 11 SP2 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This package fixes several security issues with Oracle Database Server. http://www.oracle.com/technetwork/topics/security/cpuapr2013 -1899555.html#AppendixDB Security Issue references: * CVE-2013-1534 * CVE-2013-1519 * CVE-2013-1554 * CVE-2013-1538 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager 1.7 for SLE 11 SP2: zypper in -t patch sleman17sp2-oracle-update-7713 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager 1.7 for SLE 11 SP2 (x86_64): oracle-update-1.7-0.19.1 References: http://support.novell.com/security/cve/CVE-2013-1519.html http://support.novell.com/security/cve/CVE-2013-1534.html http://support.novell.com/security/cve/CVE-2013-1538.html http://support.novell.com/security/cve/CVE-2013-1554.html https://bugzilla.novell.com/776005 https://bugzilla.novell.com/816221 https://bugzilla.novell.com/818773 http://download.novell.com/patch/finder/?keywords=e31c56d9c46ec0935588b0c944055d41 From sle-security-updates at lists.suse.com Fri May 17 17:04:27 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 18 May 2013 01:04:27 +0200 (CEST) Subject: SUSE-SU-2013:0756-2: Security update for GraphicsMagick Message-ID: <20130517230427.6B6C632269@maintenance.suse.de> SUSE Security Update: Security update for GraphicsMagick ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0756-2 Rating: low References: #773612 Affected Products: SUSE Studio Onsite 1.3 SUSE Studio Onsite 1.2 SUSE Studio Extension for System z 1.2 SUSE Linux Enterprise Software Development Kit 11 SP2 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: GraphicsMagick has been updated to fix an integer overflow (CVE-2012-3438). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-GraphicsMagick-7528 - SUSE Studio Onsite 1.2: zypper in -t patch slestso12-GraphicsMagick-7722 - SUSE Studio Extension for System z 1.2: zypper in -t patch slestso12-GraphicsMagick-7722 - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-GraphicsMagick-7528 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Studio Onsite 1.3 (x86_64): GraphicsMagick-1.2.5-4.33.1 libGraphicsMagick2-1.2.5-4.33.1 - SUSE Studio Onsite 1.2 (x86_64): GraphicsMagick-1.2.5-4.33.3 libGraphicsMagick2-1.2.5-4.33.3 - SUSE Studio Extension for System z 1.2 (s390x): GraphicsMagick-1.2.5-4.33.3 libGraphicsMagick2-1.2.5-4.33.3 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): GraphicsMagick-1.2.5-4.33.1 libGraphicsMagick2-1.2.5-4.33.1 perl-GraphicsMagick-1.2.5-4.33.1 References: https://bugzilla.novell.com/773612 http://download.novell.com/patch/finder/?keywords=9bc06dd96345347da82a1c5f648bd31b http://download.novell.com/patch/finder/?keywords=a69cabc12b7dd07c9c43423292fff230 From sle-security-updates at lists.suse.com Fri May 17 17:04:31 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 18 May 2013 01:04:31 +0200 (CEST) Subject: SUSE-SU-2013:0811-1: important: Security update for oracle-update Message-ID: <20130517230431.69DA832269@maintenance.suse.de> SUSE Security Update: Security update for oracle-update ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0811-1 Rating: important References: #816221 #818773 Cross-References: CVE-2013-1519 CVE-2013-1534 CVE-2013-1538 CVE-2013-1554 Affected Products: SUSE Manager 1.2 for SLE 11 SP1 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This package fixes several security issues with Oracle Database Servers. http://www.oracle.com/technetwork/topics/security/cpuapr2013 -1899555.html#AppendixDB Security Issue references: * CVE-2013-1534 * CVE-2013-1519 * CVE-2013-1554 * CVE-2013-1538 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager 1.2 for SLE 11 SP1: zypper in -t patch sleman12sp1-oracle-update-7711 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager 1.2 for SLE 11 SP1 (x86_64): oracle-update-1.7-0.4.20.1 References: http://support.novell.com/security/cve/CVE-2013-1519.html http://support.novell.com/security/cve/CVE-2013-1534.html http://support.novell.com/security/cve/CVE-2013-1538.html http://support.novell.com/security/cve/CVE-2013-1554.html https://bugzilla.novell.com/816221 https://bugzilla.novell.com/818773 http://download.novell.com/patch/finder/?keywords=ab35710cdc083da3e6b1474141a868a5 From sle-security-updates at lists.suse.com Tue May 21 12:04:17 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 21 May 2013 20:04:17 +0200 (CEST) Subject: SUSE-SU-2013:0814-1: important: Security update for java-1_6_0-openjdk Message-ID: <20130521180417.729123227A@maintenance.suse.de> SUSE Security Update: Security update for java-1_6_0-openjdk ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0814-1 Rating: important References: #817157 Cross-References: CVE-2013-0401 CVE-2013-1488 CVE-2013-1518 CVE-2013-1537 CVE-2013-1557 CVE-2013-1569 CVE-2013-2383 CVE-2013-2384 CVE-2013-2415 CVE-2013-2417 CVE-2013-2419 CVE-2013-2420 CVE-2013-2421 CVE-2013-2422 CVE-2013-2424 CVE-2013-2426 CVE-2013-2429 CVE-2013-2430 CVE-2013-2431 Affected Products: SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that fixes 19 vulnerabilities is now available. Description: java-1_6_0-openjdk has been updated to version Icedtea6-1.12.5 which fixes several security issues. Security fixes * S6657673, CVE-2013-1518: Issues with JAXP * S7200507: Refactor Introspector internals * S8000724, CVE-2013-2417: Improve networking serialization * S8001031, CVE-2013-2419: Better font processing * S8001040, CVE-2013-1537: Rework RMI model * S8001322: Refactor deserialization * S8001329, CVE-2013-1557: Augment RMI logging * S8003335: Better handling of Finalizer thread * S8003445: Adjust JAX-WS to focus on API * S8003543, CVE-2013-2415: Improve processing of MTOM attachments * S8004261: Improve input validation * S8004336, CVE-2013-2431: Better handling of method handle intrinsic frames * S8004986, CVE-2013-2383: Better handling of glyph table * S8004987, CVE-2013-2384: Improve font layout * S8004994, CVE-2013-1569: Improve checking of glyph table * S8005432: Update access to JAX-WS * S8005943: (process) Improved Runtime.exec * S8006309: More reliable control panel operation * S8006435, CVE-2013-2424: Improvements in JMX * S8006790: Improve checking for windows * S8006795: Improve font warning messages * S8007406: Improve accessibility of AccessBridge * S8007617, CVE-2013-2420: Better validation of images * S8007667, CVE-2013-2430: Better image reading * S8007918, CVE-2013-2429: Better image writing * S8009063, CVE-2013-2426: Improve reliability of ConcurrentHashMap * S8009305, CVE-2013-0401: Improve AWT data transfer * S8009699, CVE-2013-2421: Methodhandle lookup * S8009814, CVE-2013-1488: Better driver management * S8009857, CVE-2013-2422: Problem with plugin * RH952389: Temporary files created with insecure permissions Backports * S7197906: BlockOffsetArray::power_to_cards_back() needs to handle > 32 bit shifts * S7036559: ConcurrentHashMap footprint and contention improvements * S5102804: Memory leak in Introspector.getBeanInfo(Class) for custom BeanInfo: Class param (with WeakCache from S6397609) * S6501644: sync LayoutEngine code structure to match ICU * S6886358: layout code update * S6963811: Deadlock-prone locking changes in Introspector * S7017324: Kerning crash in JDK 7 since ICU layout update * S7064279: Introspector.getBeanInfo() should release some resources in timely manner * S8004302: javax/xml/soap/Test7013971.java fails since jdk6u39b01 * S7133220: Additional patches to JAXP 1.4.5 update 1 for 7u4 (partial for S6657673) * S8009530: ICU Kern table support broken Bug fixes * OJ3: Fix get_stack_bounds memory leak (alternate fix for S7197906) * PR1362: Fedora 19 / rawhide FTBFS SIGILL * PR1338: Remove dependence on libXp * PR1339: Simplify the rhino class rewriter to avoid use of concurrency * PR1336: Bootstrap failure on Fedora 17/18 * PR1319: Correct #ifdef to #if * PR1402: Support glibc < 2.17 with AArch64 patch * Give xalan/xerces access to their own internal packages. New features * JAXP, JAXWS & JAF supplied as patches rather than drops to aid subsequent patching. * PR1380: Add AArch64 support to Zero Security Issue references: * CVE-2013-1518 * CVE-2013-2417 * CVE-2013-2419 * CVE-2013-1537 * CVE-2013-1557 * CVE-2013-2415 * CVE-2013-2431 * CVE-2013-2383 * CVE-2013-2384 * CVE-2013-1569 * CVE-2013-2424 * CVE-2013-2420 * CVE-2013-2430 * CVE-2013-2429 * CVE-2013-2426 * CVE-2013-0401 * CVE-2013-2421 * CVE-2013-1488 * CVE-2013-2422 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-java-1_6_0-openjdk-7718 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): java-1_6_0-openjdk-1.6.0.0_b27.1.12.5-0.2.1 java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.5-0.2.1 java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.5-0.2.1 References: http://support.novell.com/security/cve/CVE-2013-0401.html http://support.novell.com/security/cve/CVE-2013-1488.html http://support.novell.com/security/cve/CVE-2013-1518.html http://support.novell.com/security/cve/CVE-2013-1537.html http://support.novell.com/security/cve/CVE-2013-1557.html http://support.novell.com/security/cve/CVE-2013-1569.html http://support.novell.com/security/cve/CVE-2013-2383.html http://support.novell.com/security/cve/CVE-2013-2384.html http://support.novell.com/security/cve/CVE-2013-2415.html http://support.novell.com/security/cve/CVE-2013-2417.html http://support.novell.com/security/cve/CVE-2013-2419.html http://support.novell.com/security/cve/CVE-2013-2420.html http://support.novell.com/security/cve/CVE-2013-2421.html http://support.novell.com/security/cve/CVE-2013-2422.html http://support.novell.com/security/cve/CVE-2013-2424.html http://support.novell.com/security/cve/CVE-2013-2426.html http://support.novell.com/security/cve/CVE-2013-2429.html http://support.novell.com/security/cve/CVE-2013-2430.html http://support.novell.com/security/cve/CVE-2013-2431.html https://bugzilla.novell.com/817157 http://download.novell.com/patch/finder/?keywords=f236ecf419309d799901460bf5bc4c25 From sle-security-updates at lists.suse.com Tue May 21 18:04:17 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 22 May 2013 02:04:17 +0200 (CEST) Subject: SUSE-SU-2013:0819-1: critical: Security update for the Linux Kernel (x86) Message-ID: <20130522000417.3FD8832278@maintenance.suse.de> SUSE Security Update: Security update for the Linux Kernel (x86) ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0819-1 Rating: critical References: #819789 Cross-References: CVE-2013-2094 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise High Availability Extension 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 SLE 11 SERVER Unsupported Extras ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes one version update. Description: This update to the SUSE Linux Enterprise 11 SP2 kernel fixes the following critical security issue: * A bounds checking problem in the perf systemcall could be used by local attackers to crash the kernel or execute code in kernel context. (CVE-2013-2094 ) Indications: Everyone using the Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-kernel-7723 slessp2-kernel-7727 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-kernel-7723 slessp2-kernel-7724 slessp2-kernel-7725 slessp2-kernel-7726 slessp2-kernel-7727 - SUSE Linux Enterprise High Availability Extension 11 SP2: zypper in -t patch sleshasp2-kernel-7723 sleshasp2-kernel-7724 sleshasp2-kernel-7725 sleshasp2-kernel-7726 sleshasp2-kernel-7727 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-kernel-7723 sledsp2-kernel-7727 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 3.0.74]: kernel-default-3.0.74-0.6.8.1 kernel-default-base-3.0.74-0.6.8.1 kernel-default-devel-3.0.74-0.6.8.1 kernel-source-3.0.74-0.6.8.1 kernel-syms-3.0.74-0.6.8.1 kernel-trace-3.0.74-0.6.8.1 kernel-trace-base-3.0.74-0.6.8.1 kernel-trace-devel-3.0.74-0.6.8.1 kernel-xen-devel-3.0.74-0.6.8.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): xen-kmp-trace-4.1.4_02_3.0.74_0.6.8-0.5.26 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586) [New Version: 3.0.74]: kernel-pae-3.0.74-0.6.8.1 kernel-pae-base-3.0.74-0.6.8.1 kernel-pae-devel-3.0.74-0.6.8.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.0.74]: kernel-default-3.0.74-0.6.8.1 kernel-default-base-3.0.74-0.6.8.1 kernel-default-devel-3.0.74-0.6.8.1 kernel-source-3.0.74-0.6.8.1 kernel-syms-3.0.74-0.6.8.1 kernel-trace-3.0.74-0.6.8.1 kernel-trace-base-3.0.74-0.6.8.1 kernel-trace-devel-3.0.74-0.6.8.1 - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64) [New Version: 3.0.74]: kernel-ec2-3.0.74-0.6.8.1 kernel-ec2-base-3.0.74-0.6.8.1 kernel-ec2-devel-3.0.74-0.6.8.1 kernel-xen-3.0.74-0.6.8.1 kernel-xen-base-3.0.74-0.6.8.1 kernel-xen-devel-3.0.74-0.6.8.1 - SUSE Linux Enterprise Server 11 SP2 (x86_64): xen-kmp-default-4.1.4_02_3.0.74_0.6.8-0.5.26 xen-kmp-trace-4.1.4_02_3.0.74_0.6.8-0.5.26 - SUSE Linux Enterprise Server 11 SP2 (s390x) [New Version: 3.0.74]: kernel-default-man-3.0.74-0.6.8.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64) [New Version: 3.0.74]: kernel-ppc64-3.0.74-0.6.8.1 kernel-ppc64-base-3.0.74-0.6.8.1 kernel-ppc64-devel-3.0.74-0.6.8.1 - SUSE Linux Enterprise Server 11 SP2 (i586) [New Version: 3.0.74]: kernel-pae-3.0.74-0.6.8.1 kernel-pae-base-3.0.74-0.6.8.1 kernel-pae-devel-3.0.74-0.6.8.1 - SUSE Linux Enterprise High Availability Extension 11 SP2 (i586 ia64 ppc64 s390x x86_64): cluster-network-kmp-default-1.4_3.0.74_0.6.8-2.18.38 cluster-network-kmp-trace-1.4_3.0.74_0.6.8-2.18.38 gfs2-kmp-default-2_3.0.74_0.6.8-0.7.70 gfs2-kmp-trace-2_3.0.74_0.6.8-0.7.70 ocfs2-kmp-default-1.6_3.0.74_0.6.8-0.11.37 ocfs2-kmp-trace-1.6_3.0.74_0.6.8-0.11.37 - SUSE Linux Enterprise High Availability Extension 11 SP2 (i586 x86_64): cluster-network-kmp-xen-1.4_3.0.74_0.6.8-2.18.38 gfs2-kmp-xen-2_3.0.74_0.6.8-0.7.70 ocfs2-kmp-xen-1.6_3.0.74_0.6.8-0.11.37 - SUSE Linux Enterprise High Availability Extension 11 SP2 (ppc64): cluster-network-kmp-ppc64-1.4_3.0.74_0.6.8-2.18.38 gfs2-kmp-ppc64-2_3.0.74_0.6.8-0.7.70 ocfs2-kmp-ppc64-1.6_3.0.74_0.6.8-0.11.37 - SUSE Linux Enterprise High Availability Extension 11 SP2 (i586): cluster-network-kmp-pae-1.4_3.0.74_0.6.8-2.18.38 gfs2-kmp-pae-2_3.0.74_0.6.8-0.7.70 ocfs2-kmp-pae-1.6_3.0.74_0.6.8-0.11.37 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 3.0.74]: kernel-default-3.0.74-0.6.8.1 kernel-default-base-3.0.74-0.6.8.1 kernel-default-devel-3.0.74-0.6.8.1 kernel-default-extra-3.0.74-0.6.8.1 kernel-source-3.0.74-0.6.8.1 kernel-syms-3.0.74-0.6.8.1 kernel-trace-3.0.74-0.6.8.1 kernel-trace-base-3.0.74-0.6.8.1 kernel-trace-devel-3.0.74-0.6.8.1 kernel-trace-extra-3.0.74-0.6.8.1 kernel-xen-3.0.74-0.6.8.1 kernel-xen-base-3.0.74-0.6.8.1 kernel-xen-devel-3.0.74-0.6.8.1 kernel-xen-extra-3.0.74-0.6.8.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): xen-kmp-default-4.1.4_02_3.0.74_0.6.8-0.5.26 xen-kmp-trace-4.1.4_02_3.0.74_0.6.8-0.5.26 - SUSE Linux Enterprise Desktop 11 SP2 (i586) [New Version: 3.0.74]: kernel-pae-3.0.74-0.6.8.1 kernel-pae-base-3.0.74-0.6.8.1 kernel-pae-devel-3.0.74-0.6.8.1 kernel-pae-extra-3.0.74-0.6.8.1 - SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64): ext4-writeable-kmp-default-0_3.0.74_0.6.8-0.14.51 ext4-writeable-kmp-trace-0_3.0.74_0.6.8-0.14.51 kernel-default-extra-3.0.74-0.6.8.1 - SLE 11 SERVER Unsupported Extras (i586 x86_64): ext4-writeable-kmp-xen-0_3.0.74_0.6.8-0.14.51 kernel-xen-extra-3.0.74-0.6.8.1 - SLE 11 SERVER Unsupported Extras (ppc64): ext4-writeable-kmp-ppc64-0_3.0.74_0.6.8-0.14.51 kernel-ppc64-extra-3.0.74-0.6.8.1 - SLE 11 SERVER Unsupported Extras (i586): ext4-writeable-kmp-pae-0_3.0.74_0.6.8-0.14.51 kernel-pae-extra-3.0.74-0.6.8.1 References: http://support.novell.com/security/cve/CVE-2013-2094.html https://bugzilla.novell.com/819789 http://download.novell.com/patch/finder/?keywords=14a50f8cb46dab3dcc863fb2227607ab http://download.novell.com/patch/finder/?keywords=3401ecfc2b691af4d127d798edcf060a http://download.novell.com/patch/finder/?keywords=375aa081f1ff6a10e2d949b47176a611 http://download.novell.com/patch/finder/?keywords=5d9fe2f45b3a2f877f1625994570692a http://download.novell.com/patch/finder/?keywords=6008a20122ec04696e8c8834aa0317aa http://download.novell.com/patch/finder/?keywords=8efbc0da700aac91059fee01a39df32d http://download.novell.com/patch/finder/?keywords=a1782fe8f690b0431b636c08c9b2f37e http://download.novell.com/patch/finder/?keywords=ca9f79d0269c0838370ad982d34bc46b http://download.novell.com/patch/finder/?keywords=e44165d6ef20693eeefcafe1aa789a24 http://download.novell.com/patch/finder/?keywords=ea355152cf44a3491af093b94e79647e From sle-security-updates at lists.suse.com Wed May 22 07:04:20 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 22 May 2013 15:04:20 +0200 (CEST) Subject: SUSE-SU-2013:0821-1: moderate: Security update for nfs-client Message-ID: <20130522130420.8D8753227A@maintenance.suse.de> SUSE Security Update: Security update for nfs-client ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0821-1 Rating: moderate References: #813464 #816897 #818094 Cross-References: CVE-2013-1923 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that solves one vulnerability and has two fixes is now available. Description: This update fixes a DNS spoofing problem with NFS rpc-gssd. (CVE-2013-1923)(bnc#813464) It also adds MOUNTD_OPTIONS and GSSD_OPTIONS to /etc/sysconfig/nfs. (bnc#818094, bnc#816897) Security Issues: * CVE-2013-1923 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-nfs-client-7717 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-nfs-client-7717 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-nfs-client-7717 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): nfs-client-1.2.3-18.31.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64): nfs-client-1.2.3-18.31.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64): nfs-client-1.2.3-18.31.1 References: http://support.novell.com/security/cve/CVE-2013-1923.html https://bugzilla.novell.com/813464 https://bugzilla.novell.com/816897 https://bugzilla.novell.com/818094 http://download.novell.com/patch/finder/?keywords=daa0b56ae8722eea764b09394fcde1a6 From sle-security-updates at lists.suse.com Wed May 22 08:04:15 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 22 May 2013 16:04:15 +0200 (CEST) Subject: SUSE-SU-2013:0822-1: moderate: Security update for nfs-utils Message-ID: <20130522140415.345993227A@maintenance.suse.de> SUSE Security Update: Security update for nfs-utils ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0822-1 Rating: moderate References: #813464 Cross-References: CVE-2013-1923 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update fixes a DNS spoofing problem with NFS rpc-gssd. (CVE-2013-1923)(bnc#813464) Security Issue reference: * CVE-2013-1923 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64): nfs-utils-1.0.7-36.52.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): nfs-utils-1.0.7-36.52.1 References: http://support.novell.com/security/cve/CVE-2013-1923.html https://bugzilla.novell.com/813464 http://download.novell.com/patch/finder/?keywords=ef37ac88c972140f7b0899d49079ba8c From sle-security-updates at lists.suse.com Fri May 24 09:04:26 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 24 May 2013 17:04:26 +0200 (CEST) Subject: SUSE-SU-2013:0819-2: critical: Security update for Linux kernel Message-ID: <20130524150426.5A97F32279@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0819-2 Rating: critical References: #819789 Cross-References: CVE-2013-2094 Affected Products: SUSE Linux Enterprise Real Time 11 SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes one version update. Description: The SUSE Linux Enterprise 11 SP2 RT kernel has been updated to fix a critical security issue. * CVE-2013-2094: A bounds checking problem in the perf systemcall could be used by local attackers to crash the kernel or execute code in kernel context. Security Issue reference: * CVE-2013-2094 Indications: Everyone using the Real Time Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Real Time 11 SP2: zypper in -t patch slertesp2-kernel-7733 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Real Time 11 SP2 (x86_64) [New Version: 3.0.74.rt98]: cluster-network-kmp-rt-1.4_3.0.74_rt98_0.6.4-2.18.38 cluster-network-kmp-rt_trace-1.4_3.0.74_rt98_0.6.4-2.18.38 drbd-kmp-rt-8.4.2_3.0.74_rt98_0.6.4-0.6.6.29 drbd-kmp-rt_trace-8.4.2_3.0.74_rt98_0.6.4-0.6.6.29 iscsitarget-kmp-rt-1.4.20_3.0.74_rt98_0.6.4-0.23.35 iscsitarget-kmp-rt_trace-1.4.20_3.0.74_rt98_0.6.4-0.23.35 kernel-rt-3.0.74.rt98-0.6.4.1 kernel-rt-base-3.0.74.rt98-0.6.4.1 kernel-rt-devel-3.0.74.rt98-0.6.4.1 kernel-rt_trace-3.0.74.rt98-0.6.4.1 kernel-rt_trace-base-3.0.74.rt98-0.6.4.1 kernel-rt_trace-devel-3.0.74.rt98-0.6.4.1 kernel-source-rt-3.0.74.rt98-0.6.4.1 kernel-syms-rt-3.0.74.rt98-0.6.4.1 lttng-modules-kmp-rt-2.0.4_3.0.74_rt98_0.6.4-0.7.31 lttng-modules-kmp-rt_trace-2.0.4_3.0.74_rt98_0.6.4-0.7.31 ocfs2-kmp-rt-1.6_3.0.74_rt98_0.6.4-0.11.37 ocfs2-kmp-rt_trace-1.6_3.0.74_rt98_0.6.4-0.11.37 ofed-kmp-rt-1.5.2_3.0.74_rt98_0.6.4-0.28.28.9 ofed-kmp-rt_trace-1.5.2_3.0.74_rt98_0.6.4-0.28.28.9 References: http://support.novell.com/security/cve/CVE-2013-2094.html https://bugzilla.novell.com/819789 http://download.novell.com/patch/finder/?keywords=979782c6831bb1be6d6b11d5030e4935 From sle-security-updates at lists.suse.com Mon May 27 09:04:27 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 27 May 2013 17:04:27 +0200 (CEST) Subject: SUSE-SU-2013:0830-1: moderate: Security update for Apache Message-ID: <20130527150427.505CD3227C@maintenance.suse.de> SUSE Security Update: Security update for Apache ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0830-1 Rating: moderate References: #722545 #757710 #774045 #777260 #782956 #788121 #793004 #798733 #806458 #807152 Cross-References: CVE-2012-0021 CVE-2012-0883 CVE-2012-2687 CVE-2012-3499 CVE-2012-4557 CVE-2012-4558 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware LTSS SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that solves 6 vulnerabilities and has four fixes is now available. It includes one version update. Description: Apache2 has been updated to fix multiple security issues: * CVE-2012-4557: Denial of Service via special requests in mod_proxy_ajp * CVE-2012-0883: improper LD_LIBRARY_PATH handling * CVE-2012-2687: filename escaping problem * CVE-2012-4558: Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server potentially allowed remote attackers to inject arbitrary web script or HTML via a crafted string. * CVE-2012-3499: Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server allowed remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules. Additionally, some non-security bugs have been fixed: * ignore case when checking against SNI server names. [bnc#798733] * httpd-2.2.x-CVE-2011-3368_CVE-2011-4317-bnc722545.diff rewor ked to reflect the upstream changes. This will prevent the "Invalid URI in request OPTIONS *" messages in the error log. [bnc#722545] * new sysconfig variable APACHE_DISABLE_SSL_COMPRESSION; if set to on, OPENSSL_NO_DEFAULT_ZLIB will be inherited to the apache process; openssl will then transparently disable compression. This change affects start script and sysconfig fillup template. Default is on, SSL compression disabled. Please see mod_deflate for compressed transfer at http layer. [bnc#782956] Security Issue references: * CVE-2012-3499 * CVE-2012-4558 * CVE-2012-4557 * CVE-2012-2687 * CVE-2012-0883 * CVE-2012-0021 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware LTSS: zypper in -t patch slessp1-apache2-7674 - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-apache2-7674 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware LTSS (i586 x86_64) [New Version: 2.2.12]: apache2-2.2.12-1.38.2 apache2-doc-2.2.12-1.38.2 apache2-example-pages-2.2.12-1.38.2 apache2-prefork-2.2.12-1.38.2 apache2-utils-2.2.12-1.38.2 apache2-worker-2.2.12-1.38.2 - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 2.2.12]: apache2-2.2.12-1.38.2 apache2-doc-2.2.12-1.38.2 apache2-example-pages-2.2.12-1.38.2 apache2-prefork-2.2.12-1.38.2 apache2-utils-2.2.12-1.38.2 apache2-worker-2.2.12-1.38.2 References: http://support.novell.com/security/cve/CVE-2012-0021.html http://support.novell.com/security/cve/CVE-2012-0883.html http://support.novell.com/security/cve/CVE-2012-2687.html http://support.novell.com/security/cve/CVE-2012-3499.html http://support.novell.com/security/cve/CVE-2012-4557.html http://support.novell.com/security/cve/CVE-2012-4558.html https://bugzilla.novell.com/722545 https://bugzilla.novell.com/757710 https://bugzilla.novell.com/774045 https://bugzilla.novell.com/777260 https://bugzilla.novell.com/782956 https://bugzilla.novell.com/788121 https://bugzilla.novell.com/793004 https://bugzilla.novell.com/798733 https://bugzilla.novell.com/806458 https://bugzilla.novell.com/807152 http://download.novell.com/patch/finder/?keywords=efd52c274921f5432920f00796e7dbd7 From sle-security-updates at lists.suse.com Mon May 27 09:05:18 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 27 May 2013 17:05:18 +0200 (CEST) Subject: SUSE-SU-2013:0648-2: moderate: Security update for Apache Message-ID: <20130527150518.7CF093227C@maintenance.suse.de> SUSE Security Update: Security update for Apache ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0648-2 Rating: moderate References: #806458 #807152 Cross-References: CVE-2012-3499 CVE-2012-4558 Affected Products: SUSE Linux Enterprise Server 10 SP3 LTSS ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: Apache2 has been updated to fix multiple security issues: This update fixes the following issues: * CVE-2012-4558: Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server potentially allowed remote attackers to inject arbitrary web script or HTML via a crafted string. * CVE-2012-3499: Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server allowed remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules. Security Issue references: * CVE-2012-3499 * CVE-2012-4558 Package List: - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64): apache2-2.2.3-16.32.47.1 apache2-devel-2.2.3-16.32.47.1 apache2-doc-2.2.3-16.32.47.1 apache2-example-pages-2.2.3-16.32.47.1 apache2-prefork-2.2.3-16.32.47.1 apache2-worker-2.2.3-16.32.47.1 References: http://support.novell.com/security/cve/CVE-2012-3499.html http://support.novell.com/security/cve/CVE-2012-4558.html https://bugzilla.novell.com/806458 https://bugzilla.novell.com/807152 http://download.novell.com/patch/finder/?keywords=db2ce8dd6eaaf22f8adf423716a58826 From sle-security-updates at lists.suse.com Mon May 27 09:05:22 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 27 May 2013 17:05:22 +0200 (CEST) Subject: SUSE-SU-2013:0835-1: important: Security update for IBM Java Message-ID: <20130527150522.2D5903227C@maintenance.suse.de> SUSE Security Update: Security update for IBM Java ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0835-1 Rating: important References: #592934 #819288 Cross-References: CVE-2013-0401 CVE-2013-1491 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1563 CVE-2013-1569 CVE-2013-2383 CVE-2013-2384 CVE-2013-2394 CVE-2013-2417 CVE-2013-2418 CVE-2013-2419 CVE-2013-2420 CVE-2013-2422 CVE-2013-2424 CVE-2013-2429 CVE-2013-2430 CVE-2013-2432 CVE-2013-2433 CVE-2013-2435 CVE-2013-2440 Affected Products: SUSE Linux Enterprise Software Development Kit 11 SP2 SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Java 11 SP2 SUSE Linux Enterprise Java 10 SP4 ______________________________________________________________________________ An update that fixes 22 vulnerabilities is now available. Description: IBM Java 1.6.0 has been updated to SR13-FP2 fixing bugs and security issues. [http://www.ibm.com/developerworks/java/jdk/alerts/)(http:// www.ibm.com/developerworks/java/jdk/alerts/) Security Issue references: * CVE-2013-2422 * CVE-2013-1491 * CVE-2013-2435 * CVE-2013-2420 * CVE-2013-2432 * CVE-2013-1569 * CVE-2013-2384 * CVE-2013-2383 * CVE-2013-1557 * CVE-2013-1537 * CVE-2013-2440 * CVE-2013-2429 * CVE-2013-2430 * CVE-2013-1563 * CVE-2013-2394 * CVE-2013-0401 * CVE-2013-2424 * CVE-2013-2419 * CVE-2013-2417 * CVE-2013-2418 * CVE-2013-1540 * CVE-2013-2433 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-java-1_6_0-ibm-7744 - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-java-1_6_0-ibm-7744 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-java-1_6_0-ibm-7744 - SUSE Linux Enterprise Java 11 SP2: zypper in -t patch slejsp2-java-1_6_0-ibm-7744 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-devel-1.6.0_sr13.2-0.3.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64): java-1_6_0-ibm-1.6.0_sr13.2-0.3.1 java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64): java-1_6_0-ibm-1.6.0_sr13.2-0.3.1 java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3.1 java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3.1 java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586): java-1_6_0-ibm-alsa-1.6.0_sr13.2-0.3.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-1.6.0_sr13.2-0.3.1 java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3.1 java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3.1 - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64): java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3.1 - SUSE Linux Enterprise Server 11 SP2 (i586): java-1_6_0-ibm-alsa-1.6.0_sr13.2-0.3.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ppc s390x x86_64): java-1_6_0-ibm-1.6.0_sr13.2-0.8.1 java-1_6_0-ibm-devel-1.6.0_sr13.2-0.8.1 java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.8.1 java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.8.1 - SUSE Linux Enterprise Server 10 SP4 (i586 ppc x86_64): java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.8.1 - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64): java-1_6_0-ibm-32bit-1.6.0_sr13.2-0.8.1 java-1_6_0-ibm-devel-32bit-1.6.0_sr13.2-0.8.1 - SUSE Linux Enterprise Server 10 SP4 (x86_64): java-1_6_0-ibm-alsa-32bit-1.6.0_sr13.2-0.8.1 java-1_6_0-ibm-plugin-32bit-1.6.0_sr13.2-0.8.1 - SUSE Linux Enterprise Server 10 SP4 (i586): java-1_6_0-ibm-alsa-1.6.0_sr13.2-0.8.1 - SUSE Linux Enterprise Server 10 SP4 (ppc): java-1_6_0-ibm-64bit-1.6.0_sr13.2-0.8.1 - SUSE Linux Enterprise Java 11 SP2 (i586 ppc64 s390x x86_64): java-1_6_0-ibm-1.6.0_sr13.2-0.3.1 java-1_6_0-ibm-devel-1.6.0_sr13.2-0.3.1 java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.3.1 java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.3.1 - SUSE Linux Enterprise Java 11 SP2 (i586 x86_64): java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.3.1 - SUSE Linux Enterprise Java 11 SP2 (i586): java-1_6_0-ibm-alsa-1.6.0_sr13.2-0.3.1 - SUSE Linux Enterprise Java 10 SP4 (x86_64): java-1_6_0-ibm-1.6.0_sr13.2-0.8.1 java-1_6_0-ibm-devel-1.6.0_sr13.2-0.8.1 java-1_6_0-ibm-fonts-1.6.0_sr13.2-0.8.1 java-1_6_0-ibm-jdbc-1.6.0_sr13.2-0.8.1 java-1_6_0-ibm-plugin-1.6.0_sr13.2-0.8.1 References: http://support.novell.com/security/cve/CVE-2013-0401.html http://support.novell.com/security/cve/CVE-2013-1491.html http://support.novell.com/security/cve/CVE-2013-1537.html http://support.novell.com/security/cve/CVE-2013-1540.html http://support.novell.com/security/cve/CVE-2013-1557.html http://support.novell.com/security/cve/CVE-2013-1563.html http://support.novell.com/security/cve/CVE-2013-1569.html http://support.novell.com/security/cve/CVE-2013-2383.html http://support.novell.com/security/cve/CVE-2013-2384.html http://support.novell.com/security/cve/CVE-2013-2394.html http://support.novell.com/security/cve/CVE-2013-2417.html http://support.novell.com/security/cve/CVE-2013-2418.html http://support.novell.com/security/cve/CVE-2013-2419.html http://support.novell.com/security/cve/CVE-2013-2420.html http://support.novell.com/security/cve/CVE-2013-2422.html http://support.novell.com/security/cve/CVE-2013-2424.html http://support.novell.com/security/cve/CVE-2013-2429.html http://support.novell.com/security/cve/CVE-2013-2430.html http://support.novell.com/security/cve/CVE-2013-2432.html http://support.novell.com/security/cve/CVE-2013-2433.html http://support.novell.com/security/cve/CVE-2013-2435.html http://support.novell.com/security/cve/CVE-2013-2440.html https://bugzilla.novell.com/592934 https://bugzilla.novell.com/819288 http://download.novell.com/patch/finder/?keywords=123f16c9260c506ce9b1083723f61ff8 http://download.novell.com/patch/finder/?keywords=518ce3eb76af52a81202b66abe2dd0f2 From sle-security-updates at lists.suse.com Mon May 27 14:04:34 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 27 May 2013 22:04:34 +0200 (CEST) Subject: SUSE-SU-2013:0837-1: moderate: Security update for subversion Message-ID: <20130527200434.EF8713227C@maintenance.suse.de> SUSE Security Update: Security update for subversion ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0837-1 Rating: moderate References: #813913 Cross-References: CVE-2013-1845 CVE-2013-1846 CVE-2013-1849 Affected Products: SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update fixes several DoS vulnerabilities in subversion's mod_dav_svn Apache HTTPD server module. (CVE-2013-1849, CVE-2013-1846, CVE-2013-1845) Security Issues: * CVE-2013-1845 * CVE-2013-1846 * CVE-2013-1849 Package List: - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64): subversion-1.3.1-1.22.1 subversion-devel-1.3.1-1.22.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64): cvs2svn-1.3.0-30.22.1 subversion-1.3.1-1.22.1 subversion-devel-1.3.1-1.22.1 subversion-python-1.3.1-1.22.1 subversion-server-1.3.1-1.22.1 subversion-tools-1.3.1-1.22.1 viewcvs-1.0.5-0.22.1 References: http://support.novell.com/security/cve/CVE-2013-1845.html http://support.novell.com/security/cve/CVE-2013-1846.html http://support.novell.com/security/cve/CVE-2013-1849.html https://bugzilla.novell.com/813913 http://download.novell.com/patch/finder/?keywords=21e270ec8a024f0ab0ccf967180f9802 From sle-security-updates at lists.suse.com Mon May 27 15:04:34 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 27 May 2013 23:04:34 +0200 (CEST) Subject: SUSE-SU-2013:0838-1: moderate: Security update for subversion Message-ID: <20130527210434.1882C3227C@maintenance.suse.de> SUSE Security Update: Security update for subversion ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0838-1 Rating: moderate References: #813913 Cross-References: CVE-2013-1845 CVE-2013-1846 CVE-2013-1847 CVE-2013-1849 CVE-2013-1884 Affected Products: SUSE Studio Onsite 1.3 SUSE Linux Enterprise Software Development Kit 11 SP2 ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: This update fixes several DoS vulnerabilities in subversion's mod_dav_svn Apache HTTPD server module. Security Issue references: * CVE-2013-1845 * CVE-2013-1846 * CVE-2013-1847 * CVE-2013-1849 * CVE-2013-1884 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-subversion-7735 - SUSE Linux Enterprise Software Development Kit 11 SP2: zypper in -t patch sdksp2-subversion-7735 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Studio Onsite 1.3 (x86_64): subversion-1.6.17-1.15.1 - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64): subversion-1.6.17-1.15.1 subversion-devel-1.6.17-1.15.1 subversion-perl-1.6.17-1.15.1 subversion-python-1.6.17-1.15.1 subversion-server-1.6.17-1.15.1 subversion-tools-1.6.17-1.15.1 References: http://support.novell.com/security/cve/CVE-2013-1845.html http://support.novell.com/security/cve/CVE-2013-1846.html http://support.novell.com/security/cve/CVE-2013-1847.html http://support.novell.com/security/cve/CVE-2013-1849.html http://support.novell.com/security/cve/CVE-2013-1884.html https://bugzilla.novell.com/813913 http://download.novell.com/patch/finder/?keywords=d302571965ffca6d19ee7c343ef9dd14 From sle-security-updates at lists.suse.com Tue May 28 12:04:29 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 28 May 2013 20:04:29 +0200 (CEST) Subject: SUSE-SU-2013:0841-1: important: Security update for SUSE Manager Message-ID: <20130528180429.F2E8332234@maintenance.suse.de> SUSE Security Update: Security update for SUSE Manager ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0841-1 Rating: important References: #819365 Cross-References: CVE-2013-2056 Affected Products: SUSE Manager 1.7 for SLE 11 SP2 SUSE Manager 1.2 for SLE 11 SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes one version update. Description: spacewalk-backend has been updated to fix an authentication checking problem. (bnc#819365, CVE-2013-2056) Security Issue reference: * CVE-2013-2056 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Manager 1.7 for SLE 11 SP2: zypper in -t patch sleman17sp2-spacewalk-backend-7746 - SUSE Manager 1.2 for SLE 11 SP1: zypper in -t patch sleman12sp1-spacewalk-backend-7748 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Manager 1.7 for SLE 11 SP2 (x86_64) [New Version: 1.7.38.24]: spacewalk-backend-1.7.38.24-0.7.1 spacewalk-backend-app-1.7.38.24-0.7.1 spacewalk-backend-applet-1.7.38.24-0.7.1 spacewalk-backend-config-files-1.7.38.24-0.7.1 spacewalk-backend-config-files-common-1.7.38.24-0.7.1 spacewalk-backend-config-files-tool-1.7.38.24-0.7.1 spacewalk-backend-iss-1.7.38.24-0.7.1 spacewalk-backend-iss-export-1.7.38.24-0.7.1 spacewalk-backend-libs-1.7.38.24-0.7.1 spacewalk-backend-package-push-server-1.7.38.24-0.7.1 spacewalk-backend-server-1.7.38.24-0.7.1 spacewalk-backend-sql-1.7.38.24-0.7.1 spacewalk-backend-sql-oracle-1.7.38.24-0.7.1 spacewalk-backend-sql-postgresql-1.7.38.24-0.7.1 spacewalk-backend-tools-1.7.38.24-0.7.1 spacewalk-backend-xml-export-libs-1.7.38.24-0.7.1 spacewalk-backend-xmlrpc-1.7.38.24-0.7.1 spacewalk-backend-xp-1.7.38.24-0.7.1 - SUSE Manager 1.2 for SLE 11 SP1 (x86_64): spacewalk-backend-1.2.74-0.60.1 spacewalk-backend-app-1.2.74-0.60.1 spacewalk-backend-applet-1.2.74-0.60.1 spacewalk-backend-config-files-1.2.74-0.60.1 spacewalk-backend-config-files-common-1.2.74-0.60.1 spacewalk-backend-config-files-tool-1.2.74-0.60.1 spacewalk-backend-iss-1.2.74-0.60.1 spacewalk-backend-iss-export-1.2.74-0.60.1 spacewalk-backend-libs-1.2.74-0.60.1 spacewalk-backend-package-push-server-1.2.74-0.60.1 spacewalk-backend-server-1.2.74-0.60.1 spacewalk-backend-sql-1.2.74-0.60.1 spacewalk-backend-sql-oracle-1.2.74-0.60.1 spacewalk-backend-tools-1.2.74-0.60.1 spacewalk-backend-xml-export-libs-1.2.74-0.60.1 spacewalk-backend-xmlrpc-1.2.74-0.60.1 spacewalk-backend-xp-1.2.74-0.60.1 References: http://support.novell.com/security/cve/CVE-2013-2056.html https://bugzilla.novell.com/819365 http://download.novell.com/patch/finder/?keywords=26e847ac77c8ff404f27e1077a152dfb http://download.novell.com/patch/finder/?keywords=8e4d137510d878e6c1ce78859fc5f7b0 From sle-security-updates at lists.suse.com Tue May 28 13:04:35 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 28 May 2013 21:04:35 +0200 (CEST) Subject: SUSE-SU-2013:0842-1: important: Security update for Mozilla Firefox Message-ID: <20130528190435.EACC627FFB@maintenance.suse.de> SUSE Security Update: Security update for Mozilla Firefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0842-1 Rating: important References: #792432 #819204 Cross-References: CVE-2013-0788 CVE-2013-0791 CVE-2013-0792 CVE-2013-0793 CVE-2013-0794 CVE-2013-0795 CVE-2013-0796 CVE-2013-0797 CVE-2013-0799 CVE-2013-0800 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that fixes 10 vulnerabilities is now available. It includes one version update. Description: Mozilla Firefox has been updated to the17.0.6ESR security release. * MFSA 2013-30: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic, and Joe Drew reported memory safety problems and crashes that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788) * MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover an out-of-bounds write in Cairo graphics library. When certain values are passed to it during rendering, Cairo attempts to use negative boundaries or sizes for boxes, leading to a potentially exploitable crash in some instances. * MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin discovered that the Mozilla Maintenance Service on Windows was vulnerable to a buffer overflow. This system is used to update software without invoking the User Account Control (UAC) prompt. The Mozilla Maintenance Service is configured to allow unprivileged users to start it with arbitrary arguments. By manipulating the data passed in these arguments, an attacker can execute arbitrary code with the system privileges used by the service. This issue requires local file system access to be exploitable. * MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an issue with the Mozilla Updater. The Mozilla Updater can be made to load a malicious local DLL file in a privileged context through either the Mozilla Maintenance Service or independently on systems that do not use the service. This occurs when the DLL file is placed in a specific location on the local system before the Mozilla Updater is run. Local file system access is necessary in order for this issue to be exploitable. * MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the Address Sanitizer tool to discover a crash in WebGL rendering when memory is freed that has not previously been allocated. This issue only affects Linux users who have Intel Mesa graphics drivers. The resulting crash could be potentially exploitable. * MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported a mechanism to use the cloneNode method to bypass System Only Wrappers (SOW) and clone a protected node. This allows violation of the browser's same origin policy and could also lead to privilege escalation and the execution of arbitrary code. * MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a method for removing the origin indication on tab-modal dialog boxes in combination with browser navigation. This could allow an attacker's dialog to overlay a page and show another site's content. This can be used for phishing by allowing users to enter data into a modal prompt dialog on an attacking, site while appearing to be from the displayed site. * MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski reported a method to use browser navigations through history to load an arbitrary website with that page's baseURI property pointing to another site instead of the seemingly loaded one. The user will continue to see the incorrect site in the addressbar of the browser. This allows for a cross-site scripting (XSS) attack or the theft of data through a phishing attack. * MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula reported that if gfx.color_management.enablev4 preference is enabled manually in about:config, some grayscale PNG images will be rendered incorrectly and cause memory corruption during PNG decoding when certain color profiles are in use. A crafted PNG image could use this flaw to leak data through rendered images drawing from random memory. By default, this preference is not enabled. * MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak reported an out-of-bounds array read in the CERT_DecodeCertPackage function of the Network Security Services (NSS) libary when decoding a certificate. When this occurs, it will lead to memory corruption and a non-exploitable crash. Security Issue references: * CVE-2013-0788 * CVE-2013-0791 * CVE-2013-0792 * CVE-2013-0793 * CVE-2013-0794 * CVE-2013-0795 * CVE-2013-0796 * CVE-2013-0797 * CVE-2013-0799 * CVE-2013-0800 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-firefox-20130516-7741 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-firefox-20130516-7741 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-firefox-20130516-7741 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 17.0.6esr]: MozillaFirefox-17.0.6esr-0.4.1 MozillaFirefox-translations-17.0.6esr-0.4.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 17.0.6esr]: MozillaFirefox-17.0.6esr-0.4.1 MozillaFirefox-translations-17.0.6esr-0.4.1 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 17.0.6esr]: MozillaFirefox-17.0.6esr-0.4.1 MozillaFirefox-translations-17.0.6esr-0.4.1 References: http://support.novell.com/security/cve/CVE-2013-0788.html http://support.novell.com/security/cve/CVE-2013-0791.html http://support.novell.com/security/cve/CVE-2013-0792.html http://support.novell.com/security/cve/CVE-2013-0793.html http://support.novell.com/security/cve/CVE-2013-0794.html http://support.novell.com/security/cve/CVE-2013-0795.html http://support.novell.com/security/cve/CVE-2013-0796.html http://support.novell.com/security/cve/CVE-2013-0797.html http://support.novell.com/security/cve/CVE-2013-0799.html http://support.novell.com/security/cve/CVE-2013-0800.html https://bugzilla.novell.com/792432 https://bugzilla.novell.com/819204 http://download.novell.com/patch/finder/?keywords=8490ea4a8a40b0f85e43941508a6b3ac From sle-security-updates at lists.suse.com Tue May 28 14:04:34 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Tue, 28 May 2013 22:04:34 +0200 (CEST) Subject: SUSE-SU-2013:0843-1: important: Security update for Mozilla Firefox Message-ID: <20130528200434.01C1A32234@maintenance.suse.de> SUSE Security Update: Security update for Mozilla Firefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0843-1 Rating: important References: #755821 #792432 #819204 Cross-References: CVE-2013-0788 CVE-2013-0791 CVE-2013-0792 CVE-2013-0793 CVE-2013-0794 CVE-2013-0795 CVE-2013-0796 CVE-2013-0797 CVE-2013-0799 CVE-2013-0800 Affected Products: SUSE Linux Enterprise Server 10 SP4 SUSE Linux Enterprise Desktop 10 SP4 SLE SDK 10 SP4 ______________________________________________________________________________ An update that fixes 10 vulnerabilities is now available. It includes one version update. Description: Mozilla Firefox has been updated to the 17.0.6ESR security release. * MFSA 2013-30: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic, and Joe Drew reported memory safety problems and crashes that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788) * MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover an out-of-bounds write in Cairo graphics library. When certain values are passed to it during rendering, Cairo attempts to use negative boundaries or sizes for boxes, leading to a potentially exploitable crash in some instances. * MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin discovered that the Mozilla Maintenance Service on Windows was vulnerable to a buffer overflow. This system is used to update software without invoking the User Account Control (UAC) prompt. The Mozilla Maintenance Service is configured to allow unprivileged users to start it with arbitrary arguments. By manipulating the data passed in these arguments, an attacker can execute arbitrary code with the system privileges used by the service. This issue requires local file system access to be exploitable. * MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an issue with the Mozilla Updater. The Mozilla Updater can be made to load a malicious local DLL file in a privileged context through either the Mozilla Maintenance Service or independently on systems that do not use the service. This occurs when the DLL file is placed in a specific location on the local system before the Mozilla Updater is run. Local file system access is necessary in order for this issue to be exploitable. * MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the Address Sanitizer tool to discover a crash in WebGL rendering when memory is freed that has not previously been allocated. This issue only affects Linux users who have Intel Mesa graphics drivers. The resulting crash could be potentially exploitable. * MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported a mechanism to use the cloneNode method to bypass System Only Wrappers (SOW) and clone a protected node. This allows violation of the browser's same origin policy and could also lead to privilege escalation and the execution of arbitrary code. * MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a method for removing the origin indication on tab-modal dialog boxes in combination with browser navigation. This could allow an attacker's dialog to overlay a page and show another site's content. This can be used for phishing by allowing users to enter data into a modal prompt dialog on an attacking, site while appearing to be from the displayed site. * MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski reported a method to use browser navigations through history to load an arbitrary website with that page's baseURI property pointing to another site instead of the seemingly loaded one. The user will continue to see the incorrect site in the addressbar of the browser. This allows for a cross-site scripting (XSS) attack or the theft of data through a phishing attack. * MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula reported that if gfx.color_management.enablev4 preference is enabled manually in about:config, some grayscale PNG images will be rendered incorrectly and cause memory corruption during PNG decoding when certain color profiles are in use. A crafted PNG image could use this flaw to leak data through rendered images drawing from random memory. By default, this preference is not enabled. * MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak reported an out-of-bounds array read in the CERT_DecodeCertPackage function of the Network Security Services (NSS) libary when decoding a certificate. When this occurs, it will lead to memory corruption and a non-exploitable crash. Security Issue references: * CVE-2013-0788 * CVE-2013-0791 * CVE-2013-0792 * CVE-2013-0793 * CVE-2013-0794 * CVE-2013-0795 * CVE-2013-0796 * CVE-2013-0797 * CVE-2013-0799 * CVE-2013-0800 Package List: - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x) [New Version: 17.0.6esr]: MozillaFirefox-17.0.6esr-0.8.1 MozillaFirefox-translations-17.0.6esr-0.8.1 - SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 17.0.6esr]: MozillaFirefox-17.0.6esr-0.8.1 MozillaFirefox-translations-17.0.6esr-0.8.1 - SLE SDK 10 SP4 (i586 ia64 ppc s390x): MozillaFirefox-branding-upstream-17.0.6esr-0.8.1 References: http://support.novell.com/security/cve/CVE-2013-0788.html http://support.novell.com/security/cve/CVE-2013-0791.html http://support.novell.com/security/cve/CVE-2013-0792.html http://support.novell.com/security/cve/CVE-2013-0793.html http://support.novell.com/security/cve/CVE-2013-0794.html http://support.novell.com/security/cve/CVE-2013-0795.html http://support.novell.com/security/cve/CVE-2013-0796.html http://support.novell.com/security/cve/CVE-2013-0797.html http://support.novell.com/security/cve/CVE-2013-0799.html http://support.novell.com/security/cve/CVE-2013-0800.html https://bugzilla.novell.com/755821 https://bugzilla.novell.com/792432 https://bugzilla.novell.com/819204 http://download.novell.com/patch/finder/?keywords=e59d3899bcb89883ea3648e8d94fbf3c From sle-security-updates at lists.suse.com Fri May 31 07:04:09 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 31 May 2013 15:04:09 +0200 (CEST) Subject: SUSE-SU-2013:0845-1: critical: Security update for Linux kernel Message-ID: <20130531130409.907173223D@maintenance.suse.de> SUSE Security Update: Security update for Linux kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0845-1 Rating: critical References: #821560 Cross-References: CVE-2013-2850 Affected Products: SUSE Linux Enterprise Server 11 SP2 for VMware SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Real Time 11 SP2 SUSE Linux Enterprise High Availability Extension 11 SP2 SUSE Linux Enterprise Desktop 11 SP2 SLE 11 SERVER Unsupported Extras ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes two new package versions. Description: The SUSE Linux Enterprise 11 SP2 Realtime kernel has been updated to fix a critical security issue. * CVE-2013-2850: Incorrect strncpy usage in the network listening part of the iscsi target driver could have been used by remote attackers to crash the kernel or execute code. This required the iscsi target running on the machine and the attacker able to make a network connection to it (aka not filtered by firewalls). Security Issue reference: * CVE-2013-2850 Indications: Everyone using the Real Time Linux Kernel on x86_64 architecture should update. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP2 for VMware: zypper in -t patch slessp2-kernel-7763 slessp2-kernel-7767 - SUSE Linux Enterprise Server 11 SP2: zypper in -t patch slessp2-kernel-7763 slessp2-kernel-7764 slessp2-kernel-7765 slessp2-kernel-7766 slessp2-kernel-7767 - SUSE Linux Enterprise Real Time 11 SP2: zypper in -t patch slertesp2-kernel-7774 - SUSE Linux Enterprise High Availability Extension 11 SP2: zypper in -t patch sleshasp2-kernel-7763 sleshasp2-kernel-7764 sleshasp2-kernel-7765 sleshasp2-kernel-7766 sleshasp2-kernel-7767 - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-kernel-7763 sledsp2-kernel-7767 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 3.0.74]: kernel-default-3.0.74-0.6.10.1 kernel-default-base-3.0.74-0.6.10.1 kernel-default-devel-3.0.74-0.6.10.1 kernel-source-3.0.74-0.6.10.1 kernel-syms-3.0.74-0.6.10.1 kernel-trace-3.0.74-0.6.10.1 kernel-trace-base-3.0.74-0.6.10.1 kernel-trace-devel-3.0.74-0.6.10.1 kernel-xen-devel-3.0.74-0.6.10.1 - SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64): xen-kmp-trace-4.1.4_02_3.0.74_0.6.10-0.5.32 - SUSE Linux Enterprise Server 11 SP2 for VMware (i586) [New Version: 3.0.74]: kernel-pae-3.0.74-0.6.10.1 kernel-pae-base-3.0.74-0.6.10.1 kernel-pae-devel-3.0.74-0.6.10.1 - SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 3.0.74]: kernel-default-3.0.74-0.6.10.1 kernel-default-base-3.0.74-0.6.10.1 kernel-default-devel-3.0.74-0.6.10.1 kernel-source-3.0.74-0.6.10.1 kernel-syms-3.0.74-0.6.10.1 kernel-trace-3.0.74-0.6.10.1 kernel-trace-base-3.0.74-0.6.10.1 kernel-trace-devel-3.0.74-0.6.10.1 - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64) [New Version: 3.0.74]: kernel-ec2-3.0.74-0.6.10.1 kernel-ec2-base-3.0.74-0.6.10.1 kernel-ec2-devel-3.0.74-0.6.10.1 kernel-xen-3.0.74-0.6.10.1 kernel-xen-base-3.0.74-0.6.10.1 kernel-xen-devel-3.0.74-0.6.10.1 - SUSE Linux Enterprise Server 11 SP2 (x86_64): xen-kmp-default-4.1.4_02_3.0.74_0.6.10-0.5.32 xen-kmp-trace-4.1.4_02_3.0.74_0.6.10-0.5.32 - SUSE Linux Enterprise Server 11 SP2 (s390x) [New Version: 3.0.74]: kernel-default-man-3.0.74-0.6.10.1 - SUSE Linux Enterprise Server 11 SP2 (ppc64) [New Version: 3.0.74]: kernel-ppc64-3.0.74-0.6.10.1 kernel-ppc64-base-3.0.74-0.6.10.1 kernel-ppc64-devel-3.0.74-0.6.10.1 - SUSE Linux Enterprise Server 11 SP2 (i586) [New Version: 3.0.74]: kernel-pae-3.0.74-0.6.10.1 kernel-pae-base-3.0.74-0.6.10.1 kernel-pae-devel-3.0.74-0.6.10.1 - SUSE Linux Enterprise Real Time 11 SP2 (x86_64) [New Version: 3.0.74.rt98]: cluster-network-kmp-rt-1.4_3.0.74_rt98_0.6.6-2.18.42 cluster-network-kmp-rt_trace-1.4_3.0.74_rt98_0.6.6-2.18.42 drbd-kmp-rt-8.4.2_3.0.74_rt98_0.6.6-0.6.6.33 drbd-kmp-rt_trace-8.4.2_3.0.74_rt98_0.6.6-0.6.6.33 iscsitarget-kmp-rt-1.4.20_3.0.74_rt98_0.6.6-0.23.39 iscsitarget-kmp-rt_trace-1.4.20_3.0.74_rt98_0.6.6-0.23.39 kernel-rt-3.0.74.rt98-0.6.6.1 kernel-rt-base-3.0.74.rt98-0.6.6.1 kernel-rt-devel-3.0.74.rt98-0.6.6.1 kernel-rt_trace-3.0.74.rt98-0.6.6.1 kernel-rt_trace-base-3.0.74.rt98-0.6.6.1 kernel-rt_trace-devel-3.0.74.rt98-0.6.6.1 kernel-source-rt-3.0.74.rt98-0.6.6.1 kernel-syms-rt-3.0.74.rt98-0.6.6.1 lttng-modules-kmp-rt-2.0.4_3.0.74_rt98_0.6.6-0.7.33 lttng-modules-kmp-rt_trace-2.0.4_3.0.74_rt98_0.6.6-0.7.33 ocfs2-kmp-rt-1.6_3.0.74_rt98_0.6.6-0.11.41 ocfs2-kmp-rt_trace-1.6_3.0.74_rt98_0.6.6-0.11.41 ofed-kmp-rt-1.5.2_3.0.74_rt98_0.6.6-0.28.28.13 ofed-kmp-rt_trace-1.5.2_3.0.74_rt98_0.6.6-0.28.28.13 - SUSE Linux Enterprise High Availability Extension 11 SP2 (i586 ia64 ppc64 s390x x86_64): cluster-network-kmp-default-1.4_3.0.74_0.6.10-2.18.41 cluster-network-kmp-trace-1.4_3.0.74_0.6.10-2.18.41 gfs2-kmp-default-2_3.0.74_0.6.10-0.7.73 gfs2-kmp-trace-2_3.0.74_0.6.10-0.7.73 ocfs2-kmp-default-1.6_3.0.74_0.6.10-0.11.40 ocfs2-kmp-trace-1.6_3.0.74_0.6.10-0.11.40 - SUSE Linux Enterprise High Availability Extension 11 SP2 (i586 x86_64): cluster-network-kmp-xen-1.4_3.0.74_0.6.10-2.18.41 gfs2-kmp-xen-2_3.0.74_0.6.10-0.7.73 ocfs2-kmp-xen-1.6_3.0.74_0.6.10-0.11.40 - SUSE Linux Enterprise High Availability Extension 11 SP2 (ppc64): cluster-network-kmp-ppc64-1.4_3.0.74_0.6.10-2.18.41 gfs2-kmp-ppc64-2_3.0.74_0.6.10-0.7.73 ocfs2-kmp-ppc64-1.6_3.0.74_0.6.10-0.11.40 - SUSE Linux Enterprise High Availability Extension 11 SP2 (i586): cluster-network-kmp-pae-1.4_3.0.74_0.6.10-2.18.41 gfs2-kmp-pae-2_3.0.74_0.6.10-0.7.73 ocfs2-kmp-pae-1.6_3.0.74_0.6.10-0.11.40 - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 3.0.74]: kernel-default-3.0.74-0.6.10.1 kernel-default-base-3.0.74-0.6.10.1 kernel-default-devel-3.0.74-0.6.10.1 kernel-default-extra-3.0.74-0.6.10.1 kernel-source-3.0.74-0.6.10.1 kernel-syms-3.0.74-0.6.10.1 kernel-trace-3.0.74-0.6.10.1 kernel-trace-base-3.0.74-0.6.10.1 kernel-trace-devel-3.0.74-0.6.10.1 kernel-trace-extra-3.0.74-0.6.10.1 kernel-xen-3.0.74-0.6.10.1 kernel-xen-base-3.0.74-0.6.10.1 kernel-xen-devel-3.0.74-0.6.10.1 kernel-xen-extra-3.0.74-0.6.10.1 - SUSE Linux Enterprise Desktop 11 SP2 (x86_64): xen-kmp-default-4.1.4_02_3.0.74_0.6.10-0.5.32 xen-kmp-trace-4.1.4_02_3.0.74_0.6.10-0.5.32 - SUSE Linux Enterprise Desktop 11 SP2 (i586) [New Version: 3.0.74]: kernel-pae-3.0.74-0.6.10.1 kernel-pae-base-3.0.74-0.6.10.1 kernel-pae-devel-3.0.74-0.6.10.1 kernel-pae-extra-3.0.74-0.6.10.1 - SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64): ext4-writeable-kmp-default-0_3.0.74_0.6.10-0.14.54 ext4-writeable-kmp-trace-0_3.0.74_0.6.10-0.14.54 kernel-default-extra-3.0.74-0.6.10.1 - SLE 11 SERVER Unsupported Extras (i586 x86_64): ext4-writeable-kmp-xen-0_3.0.74_0.6.10-0.14.54 kernel-xen-extra-3.0.74-0.6.10.1 - SLE 11 SERVER Unsupported Extras (ppc64): ext4-writeable-kmp-ppc64-0_3.0.74_0.6.10-0.14.54 kernel-ppc64-extra-3.0.74-0.6.10.1 - SLE 11 SERVER Unsupported Extras (i586): ext4-writeable-kmp-pae-0_3.0.74_0.6.10-0.14.54 kernel-pae-extra-3.0.74-0.6.10.1 References: http://support.novell.com/security/cve/CVE-2013-2850.html https://bugzilla.novell.com/821560 http://download.novell.com/patch/finder/?keywords=1f8963a7f578dbd3743c6e7491b9dc1d http://download.novell.com/patch/finder/?keywords=1fa05cb548ccbbeeea9efebd433defa5 http://download.novell.com/patch/finder/?keywords=225f7ae7a37b1e0e7bd41b438e21994c http://download.novell.com/patch/finder/?keywords=29e265518fcdbbd0e187fc660202f2c3 http://download.novell.com/patch/finder/?keywords=365c32bbb93a197470729827fcb0e019 http://download.novell.com/patch/finder/?keywords=3e5a351af7e06b418ea1594238eb9522 http://download.novell.com/patch/finder/?keywords=97af1d7309a1c1d5e0b7c4b2c1382fce http://download.novell.com/patch/finder/?keywords=b6673cd99832cf4abdaec62c3d54a12b http://download.novell.com/patch/finder/?keywords=e5565b72804c88529236aa3cfa12aa88 http://download.novell.com/patch/finder/?keywords=ee98822d63fdbce81547edff1854967f http://download.novell.com/patch/finder/?keywords=f0453d05d3e6fd02abf10b3dfe5de43c From sle-security-updates at lists.suse.com Fri May 31 11:04:09 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 31 May 2013 19:04:09 +0200 (CEST) Subject: SUSE-SU-2013:0850-1: important: Security update for Mozilla Firefox Message-ID: <20130531170409.1B4C33223D@maintenance.suse.de> SUSE Security Update: Security update for Mozilla Firefox ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0850-1 Rating: important References: #819204 Affected Products: SUSE Linux Enterprise Server 11 SP1 for VMware LTSS SUSE Linux Enterprise Server 11 SP1 LTSS ______________________________________________________________________________ An update that contains security fixes can now be installed. It includes four new package versions. Description: Mozilla Firefox has been updated to the17.0.6ESR security version upgrade as a LTSS roll up release. * MFSA 2013-30: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan Sreckovic, and Joe Drew reported memory safety problems and crashes that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788) * MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya (Inferno) of the Google Chrome Security Team used the Address Sanitizer tool to discover an out-of-bounds write in Cairo graphics library. When certain values are passed to it during rendering, Cairo attempts to use negative boundaries or sizes for boxes, leading to a potentially exploitable crash in some instances. * MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin discovered that the Mozilla Maintenance Service on Windows was vulnerable to a buffer overflow. This system is used to update software without invoking the User Account Control (UAC) prompt. The Mozilla Maintenance Service is configured to allow unprivileged users to start it with arbitrary arguments. By manipulating the data passed in these arguments, an attacker can execute arbitrary code with the system privileges used by the service. This issue requires local file system access to be exploitable. * MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an issue with the Mozilla Updater. The Mozilla Updater can be made to load a malicious local DLL file in a privileged context through either the Mozilla Maintenance Service or independently on systems that do not use the service. This occurs when the DLL file is placed in a specific location on the local system before the Mozilla Updater is run. Local file system access is necessary in order for this issue to be exploitable. * MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the Address Sanitizer tool to discover a crash in WebGL rendering when memory is freed that has not previously been allocated. This issue only affects Linux users who have Intel Mesa graphics drivers. The resulting crash could be potentially exploitable. * MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported a mechanism to use the cloneNode method to bypass System Only Wrappers (SOW) and clone a protected node. This allows violation of the browser's same origin policy and could also lead to privilege escalation and the execution of arbitrary code. * MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a method for removing the origin indication on tab-modal dialog boxes in combination with browser navigation. This could allow an attacker's dialog to overlay a page and show another site's content. This can be used for phishing by allowing users to enter data into a modal prompt dialog on an attacking, site while appearing to be from the displayed site. * MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski reported a method to use browser navigations through history to load an arbitrary website with that page's baseURI property pointing to another site instead of the seemingly loaded one. The user will continue to see the incorrect site in the addressbar of the browser. This allows for a cross-site scripting (XSS) attack or the theft of data through a phishing attack. * MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula reported that if gfx.color_management.enablev4 preference is enabled manually in about:config, some grayscale PNG images will be rendered incorrectly and cause memory corruption during PNG decoding when certain color profiles are in use. A crafted PNG image could use this flaw to leak data through rendered images drawing from random memory. By default, this preference is not enabled. * MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak reported an out-of-bounds array read in the CERT_DecodeCertPackage function of the Network Security Services (NSS) libary when decoding a certificate. When this occurs, it will lead to memory corruption and a non-exploitable crash. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11 SP1 for VMware LTSS: zypper in -t patch slessp1-firefox-20130516-7755 - SUSE Linux Enterprise Server 11 SP1 LTSS: zypper in -t patch slessp1-firefox-20130516-7755 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server 11 SP1 for VMware LTSS (i586 x86_64) [New Version: 17.0.6esr,3.14.3 and 4.9.6]: MozillaFirefox-17.0.6esr-0.4.1 MozillaFirefox-translations-17.0.6esr-0.4.1 libfreebl3-3.14.3-0.4.3.1 mozilla-nspr-4.9.6-0.3.1 mozilla-nss-3.14.3-0.4.3.1 mozilla-nss-tools-3.14.3-0.4.3.1 - SUSE Linux Enterprise Server 11 SP1 for VMware LTSS (x86_64) [New Version: 3.14.3 and 4.9.6]: libfreebl3-32bit-3.14.3-0.4.3.1 mozilla-nspr-32bit-4.9.6-0.3.1 mozilla-nss-32bit-3.14.3-0.4.3.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 17.0.6esr,3.14.3,4.9.6 and 7]: MozillaFirefox-17.0.6esr-0.4.1 MozillaFirefox-branding-SLED-7-0.6.9.20 MozillaFirefox-translations-17.0.6esr-0.4.1 libfreebl3-3.14.3-0.4.3.1 mozilla-nspr-4.9.6-0.3.1 mozilla-nss-3.14.3-0.4.3.1 mozilla-nss-tools-3.14.3-0.4.3.1 - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64) [New Version: 3.14.3 and 4.9.6]: libfreebl3-32bit-3.14.3-0.4.3.1 mozilla-nspr-32bit-4.9.6-0.3.1 mozilla-nss-32bit-3.14.3-0.4.3.1 References: https://bugzilla.novell.com/819204 http://download.novell.com/patch/finder/?keywords=237c6316d58c29602f03bb36ba67c991 From sle-security-updates at lists.suse.com Fri May 31 11:04:13 2013 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 31 May 2013 19:04:13 +0200 (CEST) Subject: SUSE-SU-2013:0851-1: important: Security update for icedtea-web Message-ID: <20130531170413.372BF3223D@maintenance.suse.de> SUSE Security Update: Security update for icedtea-web ______________________________________________________________________________ Announcement ID: SUSE-SU-2013:0851-1 Rating: important References: #818768 Cross-References: CVE-2012-3422 CVE-2012-3423 CVE-2013-1926 CVE-2013-1927 Affected Products: SUSE Linux Enterprise Desktop 11 SP2 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. It includes one version update. Description: This update of icedtea-web fixes several bugs and security issues. Security Issue references: * CVE-2013-1926 * CVE-2013-1927 * CVE-2012-3422 * CVE-2012-3423 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Desktop 11 SP2: zypper in -t patch sledsp2-icedtea-web-7742 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 1.4]: icedtea-web-1.4-0.5.1 References: http://support.novell.com/security/cve/CVE-2012-3422.html http://support.novell.com/security/cve/CVE-2012-3423.html http://support.novell.com/security/cve/CVE-2013-1926.html http://support.novell.com/security/cve/CVE-2013-1927.html https://bugzilla.novell.com/818768 http://download.novell.com/patch/finder/?keywords=54cbb275b064b07a56d2e955caa4b542