SUSE-SU-2014:0168-1: moderate: Security update for Real Time Linux Kernel

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Jan 31 08:04:14 MST 2014


   SUSE Security Update: Security update for Real Time Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:0168-1
Rating:             moderate
References:         #708296 #733022 #770541 #787843 #789359 #803174 
                    #806988 #810323 #813245 #818064 #818545 #819979 
                    #820102 #820338 #821619 #821980 #825006 #825696 
                    #825896 #826602 #826756 #826978 #827527 #827767 
                    #828236 #831103 #833097 #834473 #834708 #834808 
                    #835074 #835186 #836718 #837206 #837739 #838623 
                    #839407 #839973 #840116 #840226 #841445 #841654 
                    #842239 #843185 #843419 #843429 #843445 #843642 
                    #843645 #843654 #845352 #845378 #845729 #846036 
                    #846298 #846989 #847261 #847660 #847842 #848317 
                    #848321 #848335 #848336 #848544 #848864 #849021 
                    #849029 #849034 #849256 #849362 #849404 #849675 
                    #849809 #849950 #850072 #850103 #850324 #850493 
                    #850640 #851066 #851101 #851290 #851314 #851879 
                    #852373 #852558 #852559 #852652 #852761 #853050 
                    #853051 #853053 #853428 #853465 #854546 #854634 
                    #854722 #856307 #856481 
Cross-References:   CVE-2013-2146 CVE-2013-2930 CVE-2013-4345
                    CVE-2013-4483 CVE-2013-4511 CVE-2013-4514
                    CVE-2013-4515 CVE-2013-4587 CVE-2013-4592
                    CVE-2013-6367 CVE-2013-6376 CVE-2013-6378
                    CVE-2013-6380 CVE-2013-6383 CVE-2013-6463
                    CVE-2013-7027
Affected Products:
                    SUSE Linux Enterprise Real Time Extension 11 SP3
______________________________________________________________________________

   An update that solves 16 vulnerabilities and has 83 fixes
   is now available. It includes one version update.

Description:


   The SUSE Linux Enterprise 11 Service Pack 3 RealTime
   Extension kernel was  updated to version 3.0.101, fixing
   various bugs and security issues.

   The following feature has been added:

   * supported.conf: Mark net/netfilter/xt_set as
   supported. (bnc#851066, FATE#313309)

   The following security issues have been fixed:

   *

   CVE-2013-4587: Array index error in the
   kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in
   the KVM subsystem in the Linux kernel through 3.12.5 allows
   local users to gain privileges via a large id value.
   (bnc#853050)

   *

   CVE-2013-4592: Memory leak in the
   __kvm_set_memory_region function in virt/kvm/kvm_main.c in
   the Linux kernel before 3.9 allows local users to cause a
   denial of service (memory consumption) by leveraging
   certain device access to trigger movement of memory slots.
   (bnc#851101)

   *

   CVE-2013-6367: The apic_get_tmcct function in
   arch/x86/kvm/lapic.c in the KVM subsystem in the Linux
   kernel through 3.12.5 allows guest OS users to cause a
   denial of service (divide-by-zero error and host OS crash)
   via crafted modifications of the TMICT value. (bnc#853051)

   *

   CVE-2013-6376: The recalculate_apic_map function in
   arch/x86/kvm/lapic.c in the KVM subsystem in the Linux
   kernel through 3.12.5 allows guest OS users to cause a
   denial of service (host OS crash) via a crafted ICR write
   operation in x2apic mode. (bnc#853053)

   *

   CVE-2013-4483: The ipc_rcu_putref function in
   ipc/util.c in the Linux kernel before 3.10 does not
   properly manage a reference count, which allows local users
   to cause a denial of service (memory consumption or system
   crash) via a crafted application. (bnc#848321)

   *

   CVE-2013-4511: Multiple integer overflows in Alchemy
   LCD frame-buffer drivers in the Linux kernel before 3.12
   allow local users to create a read-write memory mapping for
   the entirety of kernel memory, and consequently gain
   privileges, via crafted mmap operations, related to the (1)
   au1100fb_fb_mmap function in drivers/video/au1100fb.c and
   the (2) au1200fb_fb_mmap function in
   drivers/video/au1200fb.c. (bnc#849021)

   *

   CVE-2013-4514: Multiple buffer overflows in
   drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel
   before 3.12 allow local users to cause a denial of service
   or possibly have unspecified other impact by leveraging the
   CAP_NET_ADMIN capability and providing a long station-name
   string, related to the (1) wvlan_uil_put_info and (2)
   wvlan_set_station_nickname functions. (bnc#849029)

   *

   CVE-2013-4515: The bcm_char_ioctl function in
   drivers/staging/bcm/Bcmchar.c in the Linux kernel before
   3.12 does not initialize a certain data structure, which
   allows local users to obtain sensitive information from
   kernel memory via an IOCTL_BCM_GET_DEVICE_DRIVER_INFO ioctl
   call. (bnc#849034)

   *

   CVE-2013-6378: The lbs_debugfs_write function in
   drivers/net/wireless/libertas/debugfs.c in the Linux kernel
   through 3.12.1 allows local users to cause a denial of
   service (OOPS) by leveraging root privileges for a
   zero-length write operation. (bnc#852559)

   *

   CVE-2013-6380: The aac_send_raw_srb function in
   drivers/scsi/aacraid/commctrl.c in the Linux kernel through
   3.12.1 does not properly validate a certain size value,
   which allows local users to cause a denial of service
   (invalid pointer dereference) or possibly have unspecified
   other impact via an FSACTL_SEND_RAW_SRB ioctl call that
   triggers a crafted SRB command. (bnc#852373)

   *

   CVE-2013-7027: The ieee80211_radiotap_iterator_init
   function in net/wireless/radiotap.c in the Linux kernel
   before 3.11.7 does not check whether a frame contains any
   data outside of the header, which might allow attackers to
   cause a denial of service (buffer over-read) via a crafted
   header. (bnc#854634)

   *

   CVE-2013-6463: Linux kernel built with the networking
   support(CONFIG_NET) is vulnerable to an information leakage
   flaw in the socket layer. It could occur while doing
   recvmsg(2), recvfrom(2) socket calls. It occurs due to
   improperly initialised msg_name & msg_namelen message
   header parameters. (bnc#854722)

   *

   CVE-2013-6383: The aac_compat_ioctl function in
   drivers/scsi/aacraid/linit.c in the Linux kernel before
   3.11.8 does not require the CAP_SYS_RAWIO capability, which
   allows local users to bypass intended access restrictions
   via a crafted ioctl call. (bnc#852558)

   *

   CVE-2013-4345: Off-by-one error in the get_prng_bytes
   function in crypto/ansi_cprng.c in the Linux kernel through
   3.11.4 makes it easier for context-dependent attackers to
   defeat cryptographic protection mechanisms via multiple
   requests for small amounts of data, leading to improper
   management of the state of the consumed data. (bnc#840226)

   *

   CVE-2013-2146: arch/x86/kernel/cpu/perf_event_intel.c
   in the Linux kernel before 3.8.9, when the Performance
   Events Subsystem is enabled, specifies an incorrect
   bitmask, which allows local users to cause a denial of
   service (general protection fault and system crash) by
   attempting to set a reserved bit. (bnc#825006)

   *

   CVE-2013-2930: The perf_trace_event_perm function in
   kernel/trace/trace_event_perf.c in the Linux kernel before
   3.12.2 does not properly restrict access to the perf
   subsystem, which allows local users to enable function
   tracing via a crafted application. (bnc#849362)

   The following non-security issues have been fixed:

   * rt: upstream sysv semaphore scalability fixes
   (bnc#803174).
   * kernel: correct tlb flush on page table upgrade
   (bnc#847660, LTC#99268).
   * kernel: fix floating-point-control register save and
   restore (bnc#847660, LTC#99000).
   * kernel: correct handling of asce-type exceptions
   (bnc#851879, LTC#100293).
   * asm-generic: io: Fix ioread16/32be and iowrite16/32be
   (bnc#848335,LTC#94737).
   * watchdog: Get rid of MODULE_ALIAS_MISCDEV statements
   (bnc#827767).
   * random: fix accounting race condition with lockless
   irq entropy_count update (bnc#789359).
   * blktrace: Send BLK_TN_PROCESS events to all running
   traces (bnc#838623).
   * printk: forcibly flush nmi ringbuffer if oops is in
   progress (bnc#849675).
   * Introduce KABI exception for cpuidle_state->disable
   via #ifndef __GENKSYMS__
   * Honor state disabling in the cpuidle ladder governor
   (bnc#845378).
   * cpuidle: add a sysfs entry to disable specific C
   state for debug purpose (bnc#845378).
   * tty/hvc_iucv: Disconnect IUCV connection when
   lowering DTR (bnc#839973, LTC#97595).
   * tty/hvc_console: Add DTR/RTS callback to handle HUPCL
   control (bnc#839973, LTC#97595).
   * sched: Avoid throttle_cfs_rq() racing with
   period_timer stopping (bnc#848336).
   * sched/balancing: Periodically decay max cost of idle
   balance (bnc#849256).
   * sched: Consider max cost of idle balance per sched
   domain (bnc#849256).
   * sched: Reduce overestimating rq->avg_idle
   (bnc#849256).
   * sched: Fix cfs_bandwidth misuse of
   hrtimer_expires_remaining (bnc#848336).
   * sched: Fix hrtimer_cancel()/rq->lock deadlock
   (bnc#848336).
   * sched: Fix race on toggling cfs_bandwidth_used
   (bnc#848336).
   * sched: Guarantee new group-entities always have
   weight (bnc#848336).
   * sched: Use jump labels to reduce overhead when
   bandwidth control is inactive (bnc#848336).
   * sched: Fix several races in CFS_BANDWIDTH
   (bnc#848336).
   * futex: fix handling of read-only-mapped hugepages (VM
   Functionality).
   * mutex: Make more scalable by doing fewer atomic
   operations (bnc#849256).
   * powerpc: Fix memory hotplug with sparse vmemmap
   (bnc#827527).
   * powerpc: Add System RAM to /proc/iomem (bnc#827527).
   * powerpc/mm: Mark Memory Resources as busy
   (bnc#827527).
   * powerpc: Fix fatal SLB miss when restoring PPR
   (bnc#853465).
   * powerpc: Make function that parses RTAS error logs
   global (bnc#852761).
   * powerpc/pseries: Parse and handle EPOW interrupts
   (bnc#852761).
   * powerpc/rtas_flash: Fix validate_flash buffer
   overflow issue (bnc#847842).
   * powerpc/rtas_flash: Fix bad memory access
   (bnc#847842).
   * x86: Update UV3 hub revision ID (bnc#846298
   fate#314987).
   * x86: Remove some noise from boot log when starting
   cpus (bnc#770541).
   * x86/microcode/amd: Tone down printk(), do not treat a
   missing firmware file as an error (bnc#843654).
   * ipv6: fix race condition regarding dst->expires and
   dst->from (bnc#843185).
   * net/mlx4_core: Fix endianness bug in set_param_l
   (bnc#848335,LTC#94737).
   * netback: bump tx queue length (bnc#849404).
   * xfrm: invalidate dst on policy insertion/deletion
   (bnc#842239).
   * xfrm: prevent ipcomp scratch buffer race condition
   (bnc#842239).
   * fs: Avoid softlockup in
   shrink_dcache_for_umount_subtree (bnc#834473).
   * blkdev_max_block: make private to fs/buffer.c
   (bnc#820338).
   * storage: SMI Corporation usb key added to
   READ_CAPACITY_10 quirk (bnc#850324).
   * autofs4: autofs4_wait() vs. autofs4_catatonic_mode()
   race (bnc#851314).
   * autofs4: catatonic_mode vs. notify_daemon race
   (bnc#851314).
   * autofs4: close the races around
   autofs4_notify_daemon() (bnc#851314).
   * autofs4: deal with autofs4_write/autofs4_write races
   (bnc#851314).
   * autofs4: dont clear DCACHE_NEED_AUTOMOUNT on rootless
   mount (bnc#851314).
   * autofs4: fix deal with autofs4_write races
   (bnc#851314).
   * autofs4: use simple_empty() for empty directory check
   (bnc#851314).
   * dlm: set zero linger time on sctp socket (bnc#787843).
   * SUNRPC: Fix a data corruption issue when
   retransmitting RPC calls (no bugzilla yet - netapp confirms
   problem and fix).
   * nfs: Change NFSv4 to not recover locks after they are
   lost (bnc#828236).
   * nfs: Adapt readdirplus to application usage patterns
   (bnc#834708).
   * xfs: Account log unmount transaction correctly
   (bnc#849950).
   * xfs: improve ioend error handling (bnc#846036).
   * xfs: reduce ioend latency (bnc#846036).
   * xfs: use per-filesystem I/O completion workqueues
   (bnc#846036).
   * xfs: Hide additional entries in struct xfs_mount
   (bnc#846036 bnc#848544).
   * Btrfs: do not BUG_ON() if we get an error walking
   backrefs (FATE#312888).
   * vfs: avoid "attempt to access beyond end of device"
   warnings (bnc#820338).
   * vfs: fix O_DIRECT read past end of block device
   (bnc#820338).
   * cifs: Improve performance of browsing directories
   with several files (bnc#810323).
   * cifs: Ensure cifs directories do not show up as files
   (bnc#826602).
   * SCSI & usb-storage: add try_rc_10_first flag
   (bnc#853428).
   * iscsi_target: race condition on shutdown (bnc#850072).
   * libfcoe: Make fcoe_sysfs optional / fix fnic NULL
   exception (bnc#837206).
   * lpfc 8.3.42: Fixed issue of task management commands
   having a fixed timeout (bnc#856481).
   * advansys: Remove "last_reset" references (bnc#856481).
   * dc395: Move "last_reset" into internal host structure
   (bnc#856481).
   * Add "eh_deadline" to limit SCSI EH runtime
   (bnc#856481).
   * remove check for "resetting" (bnc#856481).
   * tmscsim: Move "last_reset" into host structure
   (bnc#856481).
   * dpt_i2o: Remove DPTI_STATE_IOCTL (bnc#856481).
   * dpt_i2o: return SCSI_MLQUEUE_HOST_BUSY when in reset
   (bnc#856481).
   * crypto: unload of aes_s390 module causes kernel panic
   (bnc#847660, LTC#98706).
   * crypto: Fix aes-xts parameter corruption (bnc#854546,
   LTC#100718).
   * crypto: gf128mul - fix call to memset() (obvious fix).
   * pcifront: Deal with toolstack missing
   "XenbusStateClosing" state.
   * xencons: generalize use of add_preferred_console()
   (bnc#733022, bnc#852652).
   * netxen: fix off by one bug in
   netxen_release_tx_buffer() (bnc#845729).
   * igb: Fix get_fw_version function for all parts
   (bnc#848317).
   * igb: Refactor of init_nvm_params (bnc#848317).
   * r8169: check ALDPS bit and disable it if enabled for
   the 8168g (bnc#845352).
   * qeth: request length checking in snmp ioctl
   (bnc#847660, LTC#99511).
   * usb: Fix xHCI host issues on remote wakeup
   (bnc#846989).
   * xhci: Limit the spurious wakeup fix only to HP
   machines (bnc#833097).
   * Intel xhci: refactor EHCI/xHCI port switching
   (bnc#840116).
   * xhci-hub.c: preserved kABI (bnc#840116).
   * xhci: Refactor port status into a new function
   (bnc#840116).
   * ALSA: hda - Fix inconsistent mic-mute LED
   (bnc#848864).
   * ALSA: hda - load EQ params into IDT codec on HP bNB13
   systems (bnc#850493).
   * lpfc: correct some issues with txcomplq processing
   (bnc#818064).
   * lpfc: correct an issue with rrq processing
   (bnc#818064).
   * sd: avoid deadlocks when running under multipath
   (bnc#818545).
   * sd: fix crash when UA received on DIF enabled device
   (bnc#841445).
   * sg: fix blk_get_queue usage (bnc#834808).
   * lpfc: Do not free original IOCB whenever ABTS fails
   (bnc#806988).
   * lpfc: Fix kernel warning on spinlock usage
   (bnc#806988).
   * lpfc: Fixed system panic due to midlayer abort
   (bnc#806988).
   * qla2xxx: Add module parameter to override the default
   request queue size (bnc#826756).
   * qla2xxx: Module parameter "ql2xasynclogin"
   (bnc#825896).
   * Pragmatic workaround for realtime class abuse induced
   latency issues.
   * Provide realtime priority kthread and workqueue boot
   options (bnc#836718).
   * mlx4: allocate just enough pages instead of always 4
   pages (bnc#835186 bnc#835074).
   * mlx4: allow order-0 memory allocations in RX path
   (bnc#835186 bnc#835074).
   * net/mlx4: use one page fragment per incoming frame
   (bnc#835186 bnc#835074).
   * bna: do not register ndo_set_rx_mode callback
   (bnc#847261).
   * PCI: pciehp: Retrieve link speed after link is
   trained (bnc#820102).
   * PCI: Separate pci_bus_read_dev_vendor_id from
   pci_scan_device (bnc#820102).
   * PCI: pciehp: replace unconditional sleep with config
   space access check (bnc#820102).
   * PCI: pciehp: make check_link_active more helpful
   (bnc#820102).
   * PCI: pciehp: Add pcie_wait_link_not_active()
   (bnc#820102).
   * PCI: pciehp: Add Disable/enable link functions
   (bnc#820102).
   * PCI: pciehp: Disable/enable link during slot power
   off/on (bnc#820102).
   * PCI: Add pcibios_pm_ops for optional arch-specific
   hibernate functionality (bnc#848335,FATE#83037,LTC#94737).
   * PCI: Add pcibios_release_device()
   (bnc#848335,FATE#83037,LTC#94737).
   * PCI: fix truncation of resource size to 32 bits
   (bnc#843419).
   * hv: handle more than just WS2008 in KVP negotiation
   (bnc#850640).
   * mei: ME hardware reset needs to be synchronized
   (bnc#821619).
   * kabi: Restore struct irq_desc::timer_rand_state.
   * fs3270: unloading module does not remove device
   (bnc#851879, LTC#100284).
   * cio: add message for timeouts on internal I/O
   (bnc#837739,LTC#97047).
   * isci: Fix a race condition in the SSP task management
   path (bnc#826978).
   * ptp: dynamic allocation of PHC char devices
   (bnc#851290).
   * dm-mpath: Fixup race condition in activate_path()
   (bnc#708296).
   * dm-mpath: do not detach stale hardware handler
   (bnc#708296).
   * dm-multipath: Improve logging (bnc#708296).
   * scsi_dh: invoke callback if ->activate is not present
   (bnc#708296).
   * scsi_dh: return individual errors in
   scsi_dh_activate() (bnc#708296).
   * scsi_dh_alua: Decode EMC Clariion extended inquiry
   (bnc#708296).
   * scsi_dh_alua: Decode HP EVA array identifier
   (bnc#708296).
   * scsi_dh_alua: Evaluate state for all port groups
   (bnc#708296).
   * scsi_dh_alua: Fix missing close brace in
   alua_check_sense (bnc#843642).
   * scsi_dh_alua: Make stpg synchronous (bnc#708296).
   * scsi_dh_alua: Pass buffer as function argument
   (bnc#708296).
   * scsi_dh_alua: Re-evaluate port group states after
   STPG (bnc#708296).
   * scsi_dh_alua: Recheck state on transitioning
   (bnc#708296).
   * scsi_dh_alua: Rework rtpg workqueue (bnc#708296).
   * scsi_dh_alua: Use separate alua_port_group structure
   (bnc#708296).
   * scsi_dh_alua: Allow get_alua_data() to return NULL
   (bnc#839407).
   * scsi_dh_alua: asynchronous RTPG (bnc#708296).
   * scsi_dh_alua: correctly terminate target port strings
   (bnc#708296).
   * scsi_dh_alua: defer I/O while workqueue item is
   pending (bnc#708296).
   * scsi_dh_alua: Do not attach to RAID or enclosure
   devices (bnc#819979).
   * scsi_dh_alua: Do not attach to well-known LUNs
   (bnc#821980).
   * scsi_dh_alua: fine-grained locking in
   alua_rtpg_work() (bnc#708296).
   * scsi_dh_alua: invalid state information for
   "optimized" paths (bnc#843445).
   * scsi_dh_alua: move RTPG to workqueue (bnc#708296).
   * scsi_dh_alua: move "expiry" into PG structure
   (bnc#708296).
   * scsi_dh_alua: move some sense code handling into
   generic code (bnc#813245).
   * scsi_dh_alua: multipath failover fails with error 15
   (bnc#825696).
   * scsi_dh_alua: parse target device id (bnc#708296).
   * scsi_dh_alua: protect accesses to struct
   alua_port_group (bnc#708296).
   * scsi_dh_alua: put sense buffer on stack (bnc#708296).
   * scsi_dh_alua: reattaching device handler fails with
   "Error 15" (bnc#843429).
   * scsi_dh_alua: remove locking when checking state
   (bnc#708296).
   * scsi_dh_alua: remove stale variable (bnc#708296).
   * scsi_dh_alua: retry RTPG on UNIT ATTENTION
   (bnc#708296).
   * scsi_dh_alua: retry command on "mode parameter
   changed" sense code (bnc#843645).
   * scsi_dh_alua: simplify alua_check_sense()
   (bnc#843642).
   * scsi_dh_alua: simplify state update (bnc#708296).
   * scsi_dh_alua: use delayed_work (bnc#708296).
   * scsi_dh_alua: use flag for RTPG extended header
   (bnc#708296).
   * scsi_dh_alua: use local buffer for VPD inquiry
   (bnc#708296).
   * scsi_dh_alua: use spin_lock_irqsave for port group
   (bnc#708296).
   * scsi_dh_alua: defer I/O while workqueue item is
   pending (bnc#708296).
   * scsi_dh_alua: Rework rtpg workqueue (bnc#708296).
   * scsi_dh_alua: use delayed_work (bnc#708296).
   * scsi_dh_alua: move "expiry" into PG structure
   (bnc#708296).
   * scsi_dh: invoke callback if ->activate is not present
   (bnc#708296).
   * scsi_dh_alua: correctly terminate target port strings
   (bnc#708296).
   * scsi_dh_alua: retry RTPG on UNIT ATTENTION
   (bnc#708296).
   * scsi_dh_alua: protect accesses to struct
   alua_port_group (bnc#708296).
   * scsi_dh_alua: fine-grained locking in
   alua_rtpg_work() (bnc#708296).
   * scsi_dh_alua: use spin_lock_irqsave for port group
   (bnc#708296).
   * scsi_dh_alua: remove locking when checking state
   (bnc#708296).
   * scsi_dh_alua: remove stale variable (bnc#708296).
   * scsi_dh: return individual errors in
   scsi_dh_activate() (bnc#708296).
   * drm/i915: add I915_PARAM_HAS_VEBOX to i915_getparam
   (bnc#831103,FATE#316109).
   * drm/i915: add I915_EXEC_VEBOX to
   i915_gem_do_execbuffer() (bnc#831103,FATE#316109).
   * drm/i915: add VEBOX into debugfs
   (bnc#831103,FATE#316109).
   * drm/i915: Enable vebox interrupts
   (bnc#831103,FATE#316109).
   * drm/i915: vebox interrupt get/put
   (bnc#831103,FATE#316109).
   * drm/i915: consolidate interrupt naming scheme
   (bnc#831103,FATE#316109).
   * drm/i915: Convert irq_refounct to struct
   (bnc#831103,FATE#316109).
   * drm/i915: make PM interrupt writes non-destructive
   (bnc#831103,FATE#316109).
   * drm/i915: Add PM regs to pre/post install
   (bnc#831103,FATE#316109).
   * drm/i915: Create an ivybridge_irq_preinstall
   (bnc#831103,FATE#316109).
   * drm/i915: Create a more generic pm handler for hsw+
   (bnc#831103,FATE#316109).
   * drm/i915: Vebox ringbuffer init
   (bnc#831103,FATE#316109).
   * drm/i915: add HAS_VEBOX (bnc#831103,FATE#316109).
   * drm/i915: Rename ring flush functions
   (bnc#831103,FATE#316109).
   * drm/i915: Add VECS semaphore bits
   (bnc#831103,FATE#316109).
   * drm/i915: Introduce VECS: the 4th ring
   (bnc#831103,FATE#316109).
   * drm/i915: Semaphore MBOX update generalization
   (bnc#831103,FATE#316109).
   * drm/i915: Comments for semaphore clarification
   (bnc#831103,FATE#316109).
   * drm/i915: fix gen4 digital port hotplug definitions
   (bnc#850103).
   * drm/mgag200: Bug fix: Modified pll algorithm for EH
   project (bnc#841654).
   * drm: do not add inferred modes for monitors that do
   not support them (bnc #849809).

   Security Issues:

   * CVE-2013-2146
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2146
   >
   * CVE-2013-2930
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2930
   >
   * CVE-2013-4345
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4345
   >
   * CVE-2013-4483
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483
   >
   * CVE-2013-4511
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4511
   >
   * CVE-2013-4514
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4514
   >
   * CVE-2013-4515
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4515
   >
   * CVE-2013-4587
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4587
   >
   * CVE-2013-4592
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4592
   >
   * CVE-2013-6367
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6367
   >
   * CVE-2013-6376
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6376
   >
   * CVE-2013-6378
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6378
   >
   * CVE-2013-6380
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6380
   >
   * CVE-2013-6383
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6383
   >
   * CVE-2013-6463
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6463
   >
   * CVE-2013-7027
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7027
   >

Indications:

   Everyone using the Real Time Linux Kernel on x86_64 architecture should update.

Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Real Time Extension 11 SP3:

      zypper in -t patch slertesp3-kernel-8793

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Real Time Extension 11 SP3 (x86_64) [New Version: 3.0.101.rt130]:

      cluster-network-kmp-rt-1.4_3.0.101_rt130_0.10-2.27.37
      cluster-network-kmp-rt_trace-1.4_3.0.101_rt130_0.10-2.27.37
      drbd-kmp-rt-8.4.4_3.0.101_rt130_0.10-0.22.3
      drbd-kmp-rt_trace-8.4.4_3.0.101_rt130_0.10-0.22.3
      iscsitarget-kmp-rt-1.4.20_3.0.101_rt130_0.10-0.38.22
      iscsitarget-kmp-rt_trace-1.4.20_3.0.101_rt130_0.10-0.38.22
      kernel-rt-3.0.101.rt130-0.10.1
      kernel-rt-base-3.0.101.rt130-0.10.1
      kernel-rt-devel-3.0.101.rt130-0.10.1
      kernel-rt_trace-3.0.101.rt130-0.10.1
      kernel-rt_trace-base-3.0.101.rt130-0.10.1
      kernel-rt_trace-devel-3.0.101.rt130-0.10.1
      kernel-source-rt-3.0.101.rt130-0.10.1
      kernel-syms-rt-3.0.101.rt130-0.10.1
      lttng-modules-kmp-rt-2.1.1_3.0.101_rt130_0.10-0.11.22
      lttng-modules-kmp-rt_trace-2.1.1_3.0.101_rt130_0.10-0.11.22
      ocfs2-kmp-rt-1.6_3.0.101_rt130_0.10-0.20.37
      ocfs2-kmp-rt_trace-1.6_3.0.101_rt130_0.10-0.20.37
      ofed-kmp-rt-1.5.4.1_3.0.101_rt130_0.10-0.13.28
      ofed-kmp-rt_trace-1.5.4.1_3.0.101_rt130_0.10-0.13.28


References:

   http://support.novell.com/security/cve/CVE-2013-2146.html
   http://support.novell.com/security/cve/CVE-2013-2930.html
   http://support.novell.com/security/cve/CVE-2013-4345.html
   http://support.novell.com/security/cve/CVE-2013-4483.html
   http://support.novell.com/security/cve/CVE-2013-4511.html
   http://support.novell.com/security/cve/CVE-2013-4514.html
   http://support.novell.com/security/cve/CVE-2013-4515.html
   http://support.novell.com/security/cve/CVE-2013-4587.html
   http://support.novell.com/security/cve/CVE-2013-4592.html
   http://support.novell.com/security/cve/CVE-2013-6367.html
   http://support.novell.com/security/cve/CVE-2013-6376.html
   http://support.novell.com/security/cve/CVE-2013-6378.html
   http://support.novell.com/security/cve/CVE-2013-6380.html
   http://support.novell.com/security/cve/CVE-2013-6383.html
   http://support.novell.com/security/cve/CVE-2013-6463.html
   http://support.novell.com/security/cve/CVE-2013-7027.html
   https://bugzilla.novell.com/708296
   https://bugzilla.novell.com/733022
   https://bugzilla.novell.com/770541
   https://bugzilla.novell.com/787843
   https://bugzilla.novell.com/789359
   https://bugzilla.novell.com/803174
   https://bugzilla.novell.com/806988
   https://bugzilla.novell.com/810323
   https://bugzilla.novell.com/813245
   https://bugzilla.novell.com/818064
   https://bugzilla.novell.com/818545
   https://bugzilla.novell.com/819979
   https://bugzilla.novell.com/820102
   https://bugzilla.novell.com/820338
   https://bugzilla.novell.com/821619
   https://bugzilla.novell.com/821980
   https://bugzilla.novell.com/825006
   https://bugzilla.novell.com/825696
   https://bugzilla.novell.com/825896
   https://bugzilla.novell.com/826602
   https://bugzilla.novell.com/826756
   https://bugzilla.novell.com/826978
   https://bugzilla.novell.com/827527
   https://bugzilla.novell.com/827767
   https://bugzilla.novell.com/828236
   https://bugzilla.novell.com/831103
   https://bugzilla.novell.com/833097
   https://bugzilla.novell.com/834473
   https://bugzilla.novell.com/834708
   https://bugzilla.novell.com/834808
   https://bugzilla.novell.com/835074
   https://bugzilla.novell.com/835186
   https://bugzilla.novell.com/836718
   https://bugzilla.novell.com/837206
   https://bugzilla.novell.com/837739
   https://bugzilla.novell.com/838623
   https://bugzilla.novell.com/839407
   https://bugzilla.novell.com/839973
   https://bugzilla.novell.com/840116
   https://bugzilla.novell.com/840226
   https://bugzilla.novell.com/841445
   https://bugzilla.novell.com/841654
   https://bugzilla.novell.com/842239
   https://bugzilla.novell.com/843185
   https://bugzilla.novell.com/843419
   https://bugzilla.novell.com/843429
   https://bugzilla.novell.com/843445
   https://bugzilla.novell.com/843642
   https://bugzilla.novell.com/843645
   https://bugzilla.novell.com/843654
   https://bugzilla.novell.com/845352
   https://bugzilla.novell.com/845378
   https://bugzilla.novell.com/845729
   https://bugzilla.novell.com/846036
   https://bugzilla.novell.com/846298
   https://bugzilla.novell.com/846989
   https://bugzilla.novell.com/847261
   https://bugzilla.novell.com/847660
   https://bugzilla.novell.com/847842
   https://bugzilla.novell.com/848317
   https://bugzilla.novell.com/848321
   https://bugzilla.novell.com/848335
   https://bugzilla.novell.com/848336
   https://bugzilla.novell.com/848544
   https://bugzilla.novell.com/848864
   https://bugzilla.novell.com/849021
   https://bugzilla.novell.com/849029
   https://bugzilla.novell.com/849034
   https://bugzilla.novell.com/849256
   https://bugzilla.novell.com/849362
   https://bugzilla.novell.com/849404
   https://bugzilla.novell.com/849675
   https://bugzilla.novell.com/849809
   https://bugzilla.novell.com/849950
   https://bugzilla.novell.com/850072
   https://bugzilla.novell.com/850103
   https://bugzilla.novell.com/850324
   https://bugzilla.novell.com/850493
   https://bugzilla.novell.com/850640
   https://bugzilla.novell.com/851066
   https://bugzilla.novell.com/851101
   https://bugzilla.novell.com/851290
   https://bugzilla.novell.com/851314
   https://bugzilla.novell.com/851879
   https://bugzilla.novell.com/852373
   https://bugzilla.novell.com/852558
   https://bugzilla.novell.com/852559
   https://bugzilla.novell.com/852652
   https://bugzilla.novell.com/852761
   https://bugzilla.novell.com/853050
   https://bugzilla.novell.com/853051
   https://bugzilla.novell.com/853053
   https://bugzilla.novell.com/853428
   https://bugzilla.novell.com/853465
   https://bugzilla.novell.com/854546
   https://bugzilla.novell.com/854634
   https://bugzilla.novell.com/854722
   https://bugzilla.novell.com/856307
   https://bugzilla.novell.com/856481
   http://download.novell.com/patch/finder/?keywords=d10502547c5fe6d29cecad7489074294



More information about the sle-security-updates mailing list