drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme im Kernel
Name: |
Mehrere Probleme im Kernel |
|
ID: |
openSUSE-SU-2014:0840-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
openSUSE 13.1 |
|
Datum: |
Mi, 25. Juni 2014, 10:40 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0055
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0077
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2678
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2851
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153 |
|
Applikationen: |
Linux |
|
Originalnachricht |
openSUSE Security Update: kernel: security and bugfix update ______________________________________________________________________________
Announcement ID: openSUSE-SU-2014:0840-1 Rating: important References: #851338 #858067 #868315 #869563 #870173 #870576 #871561 #872715 #873374 #876102 #876981 #877257 #877713 #877721 #878115 #878274 #879258 #879792 #880599 #880613 #880892 #881697 #881727 #882648 Cross-References: CVE-2013-7339 CVE-2014-0055 CVE-2014-0077 CVE-2014-2678 CVE-2014-2851 CVE-2014-3122 CVE-2014-3144 CVE-2014-3145 CVE-2014-3153 Affected Products: openSUSE 13.1 ______________________________________________________________________________
An update that solves 9 vulnerabilities and has 15 fixes is now available.
Description:
The Linux kernel was updated to fix security issues and bugs.
Security issues fixed: CVE-2014-3153: The futex_requeue function in kernel/futex.c in the Linux kernel did not ensure that calls have two different futex addresses, which allowed local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel did not check whether a certain length value is sufficiently large, which allowed local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.
CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel used the reverse order in a certain subtraction, which allowed local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced.
CVE-2014-0077: drivers/vhost/net.c in the Linux kernel, when mergeable buffers are disabled, did not properly validate packet lengths, which allowed guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.
CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package did not properly handle vhost_get_vq_desc errors, which allowed guest OS users to cause a denial of service (host OS crash) via unspecified vectors.
CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
CVE-2014-2851: Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel allowed local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
- ext4: Fix buffer double free in ext4_alloc_branch() (bnc#880599 bnc#876981).
- patches.fixes/firewire-01-net-fix-use-after-free.patch, patches.fixes/firewire-02-ohci-fix-probe-failure-with-agere-lsi-controllers .patch, patches.fixes/firewire-03-dont-use-prepare_delayed_work.patch: Add missing bug reference (bnc#881697).
- firewire: don't use PREPARE_DELAYED_WORK. - firewire: ohci: fix probe failure with Agere/LSI controllers. - firewire: net: fix use after free.
- USB: OHCI: fix problem with global suspend on ATI controllers (bnc#868315).
- mm: revert "page-writeback.c: subtract min_free_kbytes from dirtyable memory" (bnc#879792).
- usb: musb: tusb6010: Use musb->tusb_revision instead of tusb_get_revision call (bnc#872715). - usb: musb: tusb6010: Add tusb_revision to struct musb to store the revision (bnc#872715).
- ALSA: hda - Fix onboard audio on Intel H97/Z97 chipsets (bnc#880613).
- floppy: do not corrupt bio.bi_flags when reading block 0 (bnc#879258).
- reiserfs: call truncate_setsize under tailpack mutex (bnc#878115).
- Update Xen config files: Set compatibility level back to 4.1 (bnc#851338).
- Update config files. Guillaume GARDET reported a broken build due to CONFIG_USB_SERIAL_GENERIC being modular
- memcg: deprecate memory.force_empty knob (bnc#878274).
- nfsd: when reusing an existing repcache entry, unhash it first (bnc#877721).
- Enable Socketcan again for i386 and x86_64 (bnc#858067)
- xhci: extend quirk for Renesas cards (bnc#877713). - xhci: Fix resume issues on Renesas chips in Samsung laptops (bnc#877713).
- mm: try_to_unmap_cluster() should lock_page() before mlocking (bnc#876102, CVE-2014-3122).
- drm/i915, HD-audio: Don't continue probing when nomodeset is given (bnc#882648).
- x86/mm/numa: Fix 32-bit kernel NUMA boot (bnc#881727).
Patch Instructions:
To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2014-441
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i686 x86_64):
kernel-debug-3.11.10-17.2 kernel-debug-base-3.11.10-17.2 kernel-debug-base-debuginfo-3.11.10-17.2 kernel-debug-debuginfo-3.11.10-17.2 kernel-debug-debugsource-3.11.10-17.2 kernel-debug-devel-3.11.10-17.2 kernel-debug-devel-debuginfo-3.11.10-17.2 kernel-desktop-3.11.10-17.2 kernel-desktop-base-3.11.10-17.2 kernel-desktop-base-debuginfo-3.11.10-17.2 kernel-desktop-debuginfo-3.11.10-17.2 kernel-desktop-debugsource-3.11.10-17.2 kernel-desktop-devel-3.11.10-17.2 kernel-desktop-devel-debuginfo-3.11.10-17.2 kernel-ec2-3.11.10-17.1 kernel-ec2-base-3.11.10-17.1 kernel-ec2-base-debuginfo-3.11.10-17.1 kernel-ec2-debuginfo-3.11.10-17.1 kernel-ec2-debugsource-3.11.10-17.1 kernel-ec2-devel-3.11.10-17.1 kernel-ec2-devel-debuginfo-3.11.10-17.1 kernel-trace-3.11.10-17.2 kernel-trace-base-3.11.10-17.2 kernel-trace-base-debuginfo-3.11.10-17.2 kernel-trace-debuginfo-3.11.10-17.2 kernel-trace-debugsource-3.11.10-17.2 kernel-trace-devel-3.11.10-17.2 kernel-trace-devel-debuginfo-3.11.10-17.2 kernel-vanilla-3.11.10-17.2 kernel-vanilla-debuginfo-3.11.10-17.2 kernel-vanilla-debugsource-3.11.10-17.2 kernel-vanilla-devel-3.11.10-17.2 kernel-vanilla-devel-debuginfo-3.11.10-17.2 kernel-xen-3.11.10-17.2 kernel-xen-base-3.11.10-17.2 kernel-xen-base-debuginfo-3.11.10-17.2 kernel-xen-debuginfo-3.11.10-17.2 kernel-xen-debugsource-3.11.10-17.2 kernel-xen-devel-3.11.10-17.2 kernel-xen-devel-debuginfo-3.11.10-17.2
- openSUSE 13.1 (i586 x86_64):
cloop-2.639-11.10.1 cloop-debuginfo-2.639-11.10.1 cloop-debugsource-2.639-11.10.1 cloop-kmp-default-2.639_k3.11.10_17-11.10.1 cloop-kmp-default-debuginfo-2.639_k3.11.10_17-11.10.1 cloop-kmp-desktop-2.639_k3.11.10_17-11.10.1 cloop-kmp-desktop-debuginfo-2.639_k3.11.10_17-11.10.1 cloop-kmp-xen-2.639_k3.11.10_17-11.10.1 cloop-kmp-xen-debuginfo-2.639_k3.11.10_17-11.10.1 crash-7.0.2-2.10.9 crash-debuginfo-7.0.2-2.10.9 crash-debugsource-7.0.2-2.10.9 crash-devel-7.0.2-2.10.9 crash-doc-7.0.2-2.10.9 crash-eppic-7.0.2-2.10.9 crash-eppic-debuginfo-7.0.2-2.10.9 crash-gcore-7.0.2-2.10.9 crash-gcore-debuginfo-7.0.2-2.10.9 crash-kmp-default-7.0.2_k3.11.10_17-2.10.9 crash-kmp-default-debuginfo-7.0.2_k3.11.10_17-2.10.9 crash-kmp-desktop-7.0.2_k3.11.10_17-2.10.9 crash-kmp-desktop-debuginfo-7.0.2_k3.11.10_17-2.10.9 crash-kmp-xen-7.0.2_k3.11.10_17-2.10.9 crash-kmp-xen-debuginfo-7.0.2_k3.11.10_17-2.10.9 hdjmod-debugsource-1.28-16.10.1 hdjmod-kmp-default-1.28_k3.11.10_17-16.10.1 hdjmod-kmp-default-debuginfo-1.28_k3.11.10_17-16.10.1 hdjmod-kmp-desktop-1.28_k3.11.10_17-16.10.1 hdjmod-kmp-desktop-debuginfo-1.28_k3.11.10_17-16.10.1 hdjmod-kmp-xen-1.28_k3.11.10_17-16.10.1 hdjmod-kmp-xen-debuginfo-1.28_k3.11.10_17-16.10.1 ipset-6.21.1-2.14.1 ipset-debuginfo-6.21.1-2.14.1 ipset-debugsource-6.21.1-2.14.1 ipset-devel-6.21.1-2.14.1 ipset-kmp-default-6.21.1_k3.11.10_17-2.14.1 ipset-kmp-default-debuginfo-6.21.1_k3.11.10_17-2.14.1 ipset-kmp-desktop-6.21.1_k3.11.10_17-2.14.1 ipset-kmp-desktop-debuginfo-6.21.1_k3.11.10_17-2.14.1 ipset-kmp-xen-6.21.1_k3.11.10_17-2.14.1 ipset-kmp-xen-debuginfo-6.21.1_k3.11.10_17-2.14.1 iscsitarget-1.4.20.3-13.10.1 iscsitarget-debuginfo-1.4.20.3-13.10.1 iscsitarget-debugsource-1.4.20.3-13.10.1 iscsitarget-kmp-default-1.4.20.3_k3.11.10_17-13.10.1 iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.11.10_17-13.10.1 iscsitarget-kmp-desktop-1.4.20.3_k3.11.10_17-13.10.1 iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.11.10_17-13.10.1 iscsitarget-kmp-xen-1.4.20.3_k3.11.10_17-13.10.1 iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.11.10_17-13.10.1 kernel-default-3.11.10-17.2 kernel-default-base-3.11.10-17.2 kernel-default-base-debuginfo-3.11.10-17.2 kernel-default-debuginfo-3.11.10-17.2 kernel-default-debugsource-3.11.10-17.2 kernel-default-devel-3.11.10-17.2 kernel-default-devel-debuginfo-3.11.10-17.2 kernel-syms-3.11.10-17.1 libipset3-6.21.1-2.14.1 libipset3-debuginfo-6.21.1-2.14.1 ndiswrapper-1.58-10.1 ndiswrapper-debuginfo-1.58-10.1 ndiswrapper-debugsource-1.58-10.1 ndiswrapper-kmp-default-1.58_k3.11.10_17-10.1 ndiswrapper-kmp-default-debuginfo-1.58_k3.11.10_17-10.1 ndiswrapper-kmp-desktop-1.58_k3.11.10_17-10.1 ndiswrapper-kmp-desktop-debuginfo-1.58_k3.11.10_17-10.1 pcfclock-0.44-258.10.1 pcfclock-debuginfo-0.44-258.10.1 pcfclock-debugsource-0.44-258.10.1 pcfclock-kmp-default-0.44_k3.11.10_17-258.10.1 pcfclock-kmp-default-debuginfo-0.44_k3.11.10_17-258.10.1 pcfclock-kmp-desktop-0.44_k3.11.10_17-258.10.1 pcfclock-kmp-desktop-debuginfo-0.44_k3.11.10_17-258.10.1 python-virtualbox-4.2.18-2.15.2 python-virtualbox-debuginfo-4.2.18-2.15.2 vhba-kmp-debugsource-20130607-2.11.1 vhba-kmp-default-20130607_k3.11.10_17-2.11.1 vhba-kmp-default-debuginfo-20130607_k3.11.10_17-2.11.1 vhba-kmp-desktop-20130607_k3.11.10_17-2.11.1 vhba-kmp-desktop-debuginfo-20130607_k3.11.10_17-2.11.1 vhba-kmp-xen-20130607_k3.11.10_17-2.11.1 vhba-kmp-xen-debuginfo-20130607_k3.11.10_17-2.11.1 virtualbox-4.2.18-2.15.2 virtualbox-debuginfo-4.2.18-2.15.2 virtualbox-debugsource-4.2.18-2.15.2 virtualbox-devel-4.2.18-2.15.2 virtualbox-guest-kmp-default-4.2.18_k3.11.10_17-2.15.2 virtualbox-guest-kmp-default-debuginfo-4.2.18_k3.11.10_17-2.15.2 virtualbox-guest-kmp-desktop-4.2.18_k3.11.10_17-2.15.2 virtualbox-guest-kmp-desktop-debuginfo-4.2.18_k3.11.10_17-2.15.2 virtualbox-guest-tools-4.2.18-2.15.2 virtualbox-guest-tools-debuginfo-4.2.18-2.15.2 virtualbox-guest-x11-4.2.18-2.15.2 virtualbox-guest-x11-debuginfo-4.2.18-2.15.2 virtualbox-host-kmp-default-4.2.18_k3.11.10_17-2.15.2 virtualbox-host-kmp-default-debuginfo-4.2.18_k3.11.10_17-2.15.2 virtualbox-host-kmp-desktop-4.2.18_k3.11.10_17-2.15.2 virtualbox-host-kmp-desktop-debuginfo-4.2.18_k3.11.10_17-2.15.2 virtualbox-qt-4.2.18-2.15.2 virtualbox-qt-debuginfo-4.2.18-2.15.2 virtualbox-websrv-4.2.18-2.15.2 virtualbox-websrv-debuginfo-4.2.18-2.15.2 xen-debugsource-4.3.2_01-18.2 xen-devel-4.3.2_01-18.2 xen-kmp-default-4.3.2_01_k3.11.10_17-18.2 xen-kmp-default-debuginfo-4.3.2_01_k3.11.10_17-18.2 xen-kmp-desktop-4.3.2_01_k3.11.10_17-18.2 xen-kmp-desktop-debuginfo-4.3.2_01_k3.11.10_17-18.2 xen-libs-4.3.2_01-18.2 xen-libs-debuginfo-4.3.2_01-18.2 xen-tools-domU-4.3.2_01-18.2 xen-tools-domU-debuginfo-4.3.2_01-18.2 xtables-addons-2.3-2.10.1 xtables-addons-debuginfo-2.3-2.10.1 xtables-addons-debugsource-2.3-2.10.1 xtables-addons-kmp-default-2.3_k3.11.10_17-2.10.1 xtables-addons-kmp-default-debuginfo-2.3_k3.11.10_17-2.10.1 xtables-addons-kmp-desktop-2.3_k3.11.10_17-2.10.1 xtables-addons-kmp-desktop-debuginfo-2.3_k3.11.10_17-2.10.1 xtables-addons-kmp-xen-2.3_k3.11.10_17-2.10.1 xtables-addons-kmp-xen-debuginfo-2.3_k3.11.10_17-2.10.1
- openSUSE 13.1 (noarch):
kernel-devel-3.11.10-17.2 kernel-docs-3.11.10-17.6 kernel-source-3.11.10-17.2 kernel-source-vanilla-3.11.10-17.2
- openSUSE 13.1 (x86_64):
xen-4.3.2_01-18.2 xen-doc-html-4.3.2_01-18.2 xen-libs-32bit-4.3.2_01-18.2 xen-libs-debuginfo-32bit-4.3.2_01-18.2 xen-tools-4.3.2_01-18.2 xen-tools-debuginfo-4.3.2_01-18.2 xen-xend-tools-4.3.2_01-18.2 xen-xend-tools-debuginfo-4.3.2_01-18.2
- openSUSE 13.1 (i686):
kernel-pae-3.11.10-17.2 kernel-pae-base-3.11.10-17.2 kernel-pae-base-debuginfo-3.11.10-17.2 kernel-pae-debuginfo-3.11.10-17.2 kernel-pae-debugsource-3.11.10-17.2 kernel-pae-devel-3.11.10-17.2 kernel-pae-devel-debuginfo-3.11.10-17.2
- openSUSE 13.1 (i586):
cloop-kmp-pae-2.639_k3.11.10_17-11.10.1 cloop-kmp-pae-debuginfo-2.639_k3.11.10_17-11.10.1 crash-kmp-pae-7.0.2_k3.11.10_17-2.10.9 crash-kmp-pae-debuginfo-7.0.2_k3.11.10_17-2.10.9 hdjmod-kmp-pae-1.28_k3.11.10_17-16.10.1 hdjmod-kmp-pae-debuginfo-1.28_k3.11.10_17-16.10.1 ipset-kmp-pae-6.21.1_k3.11.10_17-2.14.1 ipset-kmp-pae-debuginfo-6.21.1_k3.11.10_17-2.14.1 iscsitarget-kmp-pae-1.4.20.3_k3.11.10_17-13.10.1 iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.11.10_17-13.10.1 ndiswrapper-kmp-pae-1.58_k3.11.10_17-10.1 ndiswrapper-kmp-pae-debuginfo-1.58_k3.11.10_17-10.1 pcfclock-kmp-pae-0.44_k3.11.10_17-258.10.1 pcfclock-kmp-pae-debuginfo-0.44_k3.11.10_17-258.10.1 vhba-kmp-pae-20130607_k3.11.10_17-2.11.1 vhba-kmp-pae-debuginfo-20130607_k3.11.10_17-2.11.1 virtualbox-guest-kmp-pae-4.2.18_k3.11.10_17-2.15.2 virtualbox-guest-kmp-pae-debuginfo-4.2.18_k3.11.10_17-2.15.2 virtualbox-host-kmp-pae-4.2.18_k3.11.10_17-2.15.2 virtualbox-host-kmp-pae-debuginfo-4.2.18_k3.11.10_17-2.15.2 xen-kmp-pae-4.3.2_01_k3.11.10_17-18.2 xen-kmp-pae-debuginfo-4.3.2_01_k3.11.10_17-18.2 xtables-addons-kmp-pae-2.3_k3.11.10_17-2.10.1 xtables-addons-kmp-pae-debuginfo-2.3_k3.11.10_17-2.10.1
References:
http://support.novell.com/security/cve/CVE-2013-7339.html http://support.novell.com/security/cve/CVE-2014-0055.html http://support.novell.com/security/cve/CVE-2014-0077.html http://support.novell.com/security/cve/CVE-2014-2678.html http://support.novell.com/security/cve/CVE-2014-2851.html http://support.novell.com/security/cve/CVE-2014-3122.html http://support.novell.com/security/cve/CVE-2014-3144.html http://support.novell.com/security/cve/CVE-2014-3145.html http://support.novell.com/security/cve/CVE-2014-3153.html https://bugzilla.novell.com/851338 https://bugzilla.novell.com/858067 https://bugzilla.novell.com/868315 https://bugzilla.novell.com/869563 https://bugzilla.novell.com/870173 https://bugzilla.novell.com/870576 https://bugzilla.novell.com/871561 https://bugzilla.novell.com/872715 https://bugzilla.novell.com/873374 https://bugzilla.novell.com/876102 https://bugzilla.novell.com/876981 https://bugzilla.novell.com/877257 https://bugzilla.novell.com/877713 https://bugzilla.novell.com/877721 https://bugzilla.novell.com/878115 https://bugzilla.novell.com/878274 https://bugzilla.novell.com/879258 https://bugzilla.novell.com/879792 https://bugzilla.novell.com/880599 https://bugzilla.novell.com/880613 https://bugzilla.novell.com/880892 https://bugzilla.novell.com/881697 https://bugzilla.novell.com/881727 https://bugzilla.novell.com/882648
-- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
|
|
|
|