SUSE-SU-2014:1138-1: important: Security update for the Linux Kernel

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue Sep 16 11:04:17 MDT 2014


   SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:1138-1
Rating:             important
References:         #794824 #806431 #831058 #854722 #856756 #871797 
                    #877257 #879921 #880484 #881051 #882809 #883526 
                    #883724 #883795 #884530 #885422 #885725 #887082 
                    #889173 #892490 
Cross-References:   CVE-2013-1860 CVE-2013-4162 CVE-2013-7266
                    CVE-2013-7267 CVE-2013-7268 CVE-2013-7269
                    CVE-2013-7270 CVE-2013-7271 CVE-2014-0203
                    CVE-2014-3144 CVE-2014-3145 CVE-2014-3917
                    CVE-2014-4508 CVE-2014-4652 CVE-2014-4653
                    CVE-2014-4654 CVE-2014-4655 CVE-2014-4656
                    CVE-2014-4667 CVE-2014-4699 CVE-2014-4943
                    CVE-2014-5077
Affected Products:
                    SUSE Linux Enterprise Server 11 SP1 LTSS
                    SLE 11 SERVER Unsupported Extras
______________________________________________________________________________

   An update that fixes 22 vulnerabilities is now available.
   It includes one version update.

Description:


   The SUSE Linux Enterprise Server 11 SP1 LTSS received a roll up update to
   fix several security and non-security issues.

   The following security issues have been fixed:

       * CVE-2013-1860: Heap-based buffer overflow in the wdm_in_callback
         function in drivers/usb/class/cdc-wdm.c in the Linux kernel before
         3.8.4 allows physically proximate attackers to cause a denial of
         service (system crash) or possibly execute arbitrary code via a
         crafted cdc-wdm USB device. (bnc#806431)
       * CVE-2013-4162: The udp_v6_push_pending_frames function in
         net/ipv6/udp.c in the IPv6 implementation in the Linux kernel
         through 3.10.3 makes an incorrect function call for pending data,
         which allows local users to cause a denial of service (BUG and
         system crash) via a crafted application that uses the UDP_CORK
         option in a setsockopt system call. (bnc#831058)
       * CVE-2014-0203: The __do_follow_link function in fs/namei.c in the
         Linux kernel before 2.6.33 does not properly handle the last
         pathname component during use of certain filesystems, which allows
         local users to cause a denial of service (incorrect free operations
         and system crash) via an open system call. (bnc#883526)
       * CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2)
         BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter
         function in net/core/filter.c in the Linux kernel through 3.14.3 do
         not check whether a certain length value is sufficiently large,
         which allows local users to cause a denial of service (integer
         underflow and system crash) via crafted BPF instructions. NOTE: the
         affected code was moved to the __skb_get_nlattr and
         __skb_get_nlattr_nest functions before the vulnerability was
         announced. (bnc#877257)
       * CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in
         the sk_run_filter function in net/core/filter.c in the Linux kernel
         through 3.14.3 uses the reverse order in a certain subtraction,
         which allows local users to cause a denial of service (over-read and
         system crash) via crafted BPF instructions. NOTE: the affected code
         was moved to the __skb_get_nlattr_nest function before the
         vulnerability was announced. (bnc#877257)
       * CVE-2014-3917: kernel/auditsc.c in the Linux kernel through 3.14.5,
         when CONFIG_AUDITSYSCALL is enabled with certain syscall rules,
         allows local users to obtain potentially sensitive single-bit values
         from kernel memory or cause a denial of service (OOPS) via a large
         value of a syscall number. (bnc#880484)
       * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel
         through 3.15.1 on 32-bit x86 platforms, when syscall auditing is
         enabled and the sep CPU feature flag is set, allows local users to
         cause a denial
         of service (OOPS and system crash) via an invalid syscall number, as
   demonstrated by number 1000. (bnc#883724)
       * CVE-2014-4652: Race condition in the tlv handler functionality in
         the snd_ctl_elem_user_tlv function in sound/core/control.c in the
         ALSA control implementation in the Linux kernel before 3.15.2 allows
         local users to obtain sensitive information from kernel memory by
         leveraging /dev/snd/controlCX access. (bnc#883795)
       * CVE-2014-4653: sound/core/control.c in the ALSA control
         implementation in the Linux kernel before 3.15.2 does not ensure
         possession of a read/write lock, which allows local users to cause a
         denial of service (use-after-free) and obtain sensitive information
         from kernel memory by leveraging /dev/snd/controlCX access.
         (bnc#883795)
       * CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c
         in the ALSA control implementation in the Linux kernel before 3.15.2
         does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE
         commands, which allows local users to remove kernel controls and
         cause a denial of service (use-after-free and system crash) by
         leveraging /dev/snd/controlCX access for an ioctl call. (bnc#883795)
       * CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c
         in the ALSA control implementation in the Linux kernel before 3.15.2
         does not properly maintain the user_ctl_count value, which allows
         local users to cause a denial of service (integer overflow and limit
         bypass) by leveraging /dev/snd/controlCX access for a large number
         of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls. (bnc#883795)
       * CVE-2014-4656: Multiple integer overflows in sound/core/control.c in
         the ALSA control implementation in the Linux kernel before 3.15.2
         allow local users to cause a denial of service by leveraging
         /dev/snd/controlCX access, related to (1) index values in the
         snd_ctl_add function and (2) numid values in the
         snd_ctl_remove_numid_conflict function. (bnc#883795)
       * CVE-2014-4667: The sctp_association_free function in
         net/sctp/associola.c in the Linux kernel before 3.15.2 does not
         properly manage a certain backlog value, which allows remote
         attackers to cause a denial of service (socket outage) via a crafted
         SCTP packet. (bnc#885422)
       * CVE-2014-4699: The Linux kernel before 3.15.4 on Intel processors
         does not properly restrict use of a non-canonical value for the
         saved RIP address in the case of a system call that does not use
         IRET, which allows local users to leverage a race condition and gain
         privileges, or cause a denial of service (double fault), via a
         crafted application that makes ptrace and fork system calls.
         (bnc#885725)
       * CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
         Linux kernel through 3.15.6 allows local users to gain privileges by
         leveraging data-structure differences between an l2tp socket and an
         inet socket. (bnc#887082)
       * CVE-2014-5077: The sctp_assoc_update function in
         net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP
         authentication is enabled, allows remote attackers to cause a denial
         of service (NULL pointer dereference and OOPS) by starting to
         establish an association between two endpoints immediately after an
         exchange of INIT and INIT ACK chunks to establish an earlier
         association between these endpoints in the opposite direction.
         (bnc#889173)
       * CVE-2013-7266: The mISDN_sock_recvmsg function in
         drivers/isdn/mISDN/socket.c in the Linux kernel before 3.12.4 does
         not ensure that a certain length value is consistent with the size
         of an associated data structure, which allows local users to obtain
         sensitive information from kernel memory via a (1) recvfrom, (2)
         recvmmsg, or (3) recvmsg system call. (bnc#854722)
       * CVE-2013-7267: The atalk_recvmsg function in net/appletalk/ddp.c in
         the Linux kernel before 3.12.4 updates a certain length value
         without ensuring that an associated data structure has been
         initialized, which allows local users to obtain sensitive
         information from kernel memory via a (1) recvfrom, (2) recvmmsg, or
         (3) recvmsg system call. (bnc#854722)
       * CVE-2013-7268: The ipx_recvmsg function in net/ipx/af_ipx.c in the
         Linux kernel before 3.12.4 updates a certain length value without
         ensuring that an associated data structure has been initialized,
         which allows local users to obtain sensitive information from kernel
         memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
         (bnc#854722)
       * CVE-2013-7269: The nr_recvmsg function in net/netrom/af_netrom.c in
         the Linux kernel before 3.12.4 updates a certain length value
         without ensuring that an associated data structure has been
         initialized, which allows local users to obtain sensitive
         information from kernel memory via a (1) recvfrom, (2) recvmmsg, or
         (3) recvmsg system call. (bnc#854722)
       * CVE-2013-7270: The packet_recvmsg function in net/packet/af_packet.c
         in the Linux kernel before 3.12.4 updates a certain length value
         before ensuring that an associated data structure has been
         initialized, which allows local users to obtain sensitive
         information from kernel memory via a (1) recvfrom, (2) recvmmsg, or
         (3) recvmsg system call. (bnc#854722)
       * CVE-2013-7271: The x25_recvmsg function in net/x25/af_x25.c in the
         Linux kernel before 3.12.4 updates a certain length value without
         ensuring that an associated data structure has been initialized,
         which allows local users to obtain sensitive information from kernel
         memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
         (bnc#854722)

   The following bugs have been fixed:

       * mac80211: Fix AP powersave TX vs. wakeup race (bnc#871797).
       * tcp: Allow to disable cwnd moderation in TCP_CA_Loss state
         (bnc#879921).
       * tcp: Adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
       * flock: Fix allocation and BKL (bnc#882809).
       * sunrpc: Close a rare race in xs_tcp_setup_socket (bnc#794824,
         bnc#884530).
       * isofs: Fix unbounded recursion when processing relocated directories
         (bnc#892490).
       * bonding: Fix a race condition on cleanup in
         bond_send_unsolicited_na() (bnc#856756).
       * block: Fix race between request completion and timeout handling
         (bnc#881051).
       * Fix kABI breakage due to addition of user_ctl_lock (bnc#883795).

   Security Issues:

       * CVE-2013-1860
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1860>
       * CVE-2013-4162
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162>
       * CVE-2013-7266
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7266>
       * CVE-2013-7267
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7267>
       * CVE-2013-7268
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7268>
       * CVE-2013-7269
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7269>
       * CVE-2013-7270
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7270>
       * CVE-2013-7271
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7271>
       * CVE-2014-0203
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0203>
       * CVE-2014-3144
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144>
       * CVE-2014-3145
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145>
       * CVE-2014-3917
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917>
       * CVE-2014-4508
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508>
       * CVE-2014-4652
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652>
       * CVE-2014-4653
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653>
       * CVE-2014-4654
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654>
       * CVE-2014-4655
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655>
       * CVE-2014-4656
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656>
       * CVE-2014-4667
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667>
       * CVE-2014-4699
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699>
       * CVE-2014-4943
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943>
       * CVE-2014-5077
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077>

Indications:

   Everyone using the Linux Kernel on x86_64 architecture should update.

Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11 SP1 LTSS:

      zypper in -t patch slessp1-kernel-9658 slessp1-kernel-9660 slessp1-kernel-9667

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 2.6.32.59]:

      kernel-default-2.6.32.59-0.15.2
      kernel-default-base-2.6.32.59-0.15.2
      kernel-default-devel-2.6.32.59-0.15.2
      kernel-source-2.6.32.59-0.15.2
      kernel-syms-2.6.32.59-0.15.2
      kernel-trace-2.6.32.59-0.15.2
      kernel-trace-base-2.6.32.59-0.15.2
      kernel-trace-devel-2.6.32.59-0.15.2

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 x86_64) [New Version: 2.6.32.59]:

      kernel-ec2-2.6.32.59-0.15.2
      kernel-ec2-base-2.6.32.59-0.15.2
      kernel-ec2-devel-2.6.32.59-0.15.2
      kernel-xen-2.6.32.59-0.15.2
      kernel-xen-base-2.6.32.59-0.15.2
      kernel-xen-devel-2.6.32.59-0.15.2
      xen-kmp-default-4.0.3_21548_16_2.6.32.59_0.15-0.5.26
      xen-kmp-trace-4.0.3_21548_16_2.6.32.59_0.15-0.5.26

   - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x) [New Version: 2.6.32.59]:

      kernel-default-man-2.6.32.59-0.15.2

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586) [New Version: 2.6.32.59]:

      kernel-pae-2.6.32.59-0.15.2
      kernel-pae-base-2.6.32.59-0.15.2
      kernel-pae-devel-2.6.32.59-0.15.2
      xen-kmp-pae-4.0.3_21548_16_2.6.32.59_0.15-0.5.26

   - SLE 11 SERVER Unsupported Extras (i586 s390x x86_64):

      kernel-default-extra-2.6.32.59-0.15.2

   - SLE 11 SERVER Unsupported Extras (i586 x86_64):

      kernel-xen-extra-2.6.32.59-0.15.2

   - SLE 11 SERVER Unsupported Extras (i586):

      kernel-pae-extra-2.6.32.59-0.15.2


References:

   http://support.novell.com/security/cve/CVE-2013-1860.html
   http://support.novell.com/security/cve/CVE-2013-4162.html
   http://support.novell.com/security/cve/CVE-2013-7266.html
   http://support.novell.com/security/cve/CVE-2013-7267.html
   http://support.novell.com/security/cve/CVE-2013-7268.html
   http://support.novell.com/security/cve/CVE-2013-7269.html
   http://support.novell.com/security/cve/CVE-2013-7270.html
   http://support.novell.com/security/cve/CVE-2013-7271.html
   http://support.novell.com/security/cve/CVE-2014-0203.html
   http://support.novell.com/security/cve/CVE-2014-3144.html
   http://support.novell.com/security/cve/CVE-2014-3145.html
   http://support.novell.com/security/cve/CVE-2014-3917.html
   http://support.novell.com/security/cve/CVE-2014-4508.html
   http://support.novell.com/security/cve/CVE-2014-4652.html
   http://support.novell.com/security/cve/CVE-2014-4653.html
   http://support.novell.com/security/cve/CVE-2014-4654.html
   http://support.novell.com/security/cve/CVE-2014-4655.html
   http://support.novell.com/security/cve/CVE-2014-4656.html
   http://support.novell.com/security/cve/CVE-2014-4667.html
   http://support.novell.com/security/cve/CVE-2014-4699.html
   http://support.novell.com/security/cve/CVE-2014-4943.html
   http://support.novell.com/security/cve/CVE-2014-5077.html
   https://bugzilla.novell.com/794824
   https://bugzilla.novell.com/806431
   https://bugzilla.novell.com/831058
   https://bugzilla.novell.com/854722
   https://bugzilla.novell.com/856756
   https://bugzilla.novell.com/871797
   https://bugzilla.novell.com/877257
   https://bugzilla.novell.com/879921
   https://bugzilla.novell.com/880484
   https://bugzilla.novell.com/881051
   https://bugzilla.novell.com/882809
   https://bugzilla.novell.com/883526
   https://bugzilla.novell.com/883724
   https://bugzilla.novell.com/883795
   https://bugzilla.novell.com/884530
   https://bugzilla.novell.com/885422
   https://bugzilla.novell.com/885725
   https://bugzilla.novell.com/887082
   https://bugzilla.novell.com/889173
   https://bugzilla.novell.com/892490
   http://download.suse.com/patch/finder/?keywords=33223d7de0d6fcaf9f12c0175a720ae1
   http://download.suse.com/patch/finder/?keywords=753dcd87154cfcee28dc062d0421697d
   http://download.suse.com/patch/finder/?keywords=ad20790f90bee656575f760123b63fe2
   http://download.suse.com/patch/finder/?keywords=bb89429b2b6bbf8e51a9b446b5a9f825
   http://download.suse.com/patch/finder/?keywords=cc2185e1b7bb5f72a49d967c7dcf07ee
   http://download.suse.com/patch/finder/?keywords=f3d32743e8c31acee5f4fb836923cc28



More information about the sle-security-updates mailing list