Security update for Linux kernel
SUSE Security Update: Security update for Linux kernel
The SUSE Linux Enterprise 11 Service Pack 1 LTSS kernel was updated to fix
security issues on kernels on the x86_64 architecture.
The following security bugs have been fixed:
* CVE-2013-4299: Interpretation conflict in
drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6
allowed remote authenticated users to obtain sensitive information
or modify data via a crafted mapping to a snapshot block device
(bnc#846404).
* CVE-2014-8160: SCTP firewalling failed until the SCTP module was
loaded (bnc#913059).
* CVE-2014-9584: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel before 3.18.2 did not validate a
length value in the Extensions Reference (ER) System Use Field,
which allowed local users to obtain sensitive information from
kernel memory via a crafted iso9660 image (bnc#912654).
* CVE-2014-9585: The vdso_addr function in arch/x86/vdso/vma.c in the
Linux kernel through 3.18.2 did not properly choose memory locations
for the vDSO area, which made it easier for local users to bypass
the ASLR protection mechanism by guessing a location at the end of a
PMD (bnc#912705).
* CVE-2014-9420: The rock_continue function in fs/isofs/rock.c in the
Linux kernel through 3.18.1 did not restrict the number of Rock
Ridge continuation entries, which allowed local users to cause a
denial of service (infinite loop, and system crash or hang) via a
crafted iso9660 image (bnc#911325).
* CVE-2014-0181: The Netlink implementation in the Linux kernel
through 3.14.1 did not provide a mechanism for authorizing socket
operations based on the opener of a socket, which allowed local
users to bypass intended access restrictions and modify network
configurations by using a Netlink socket for the (1) stdout or (2)
stderr of a setuid program (bnc#875051).
* CVE-2010-5313: Race condition in arch/x86/kvm/x86.c in the Linux
kernel before 2.6.38 allowed L2 guest OS users to cause a denial of
service (L1 guest OS crash) via a crafted instruction that triggers
an L2 emulation failure report, a similar issue to CVE-2014-7842
(bnc#907822).
* CVE-2014-7842: Race condition in arch/x86/kvm/x86.c in the Linux
kernel before 3.17.4 allowed guest OS users to cause a denial of
service (guest OS crash) via a crafted application that performs an
MMIO transaction or a PIO transaction to trigger a guest userspace
emulation error report, a similar issue to CVE-2010-5313
(bnc#905312).
* CVE-2014-3688: The SCTP implementation in the Linux kernel before
3.17.4 allowed remote attackers to cause a denial of service (memory
consumption) by triggering a large number of chunks in an
associations output queue, as demonstrated by ASCONF probes, related
to net/sctp/inqueue.c and net/sctp/sm_statefuns.c (bnc#902351).
* CVE-2014-3687: The sctp_assoc_lookup_asconf_ack function in
net/sctp/associola.c in the SCTP implementation in the Linux kernel
through 3.17.2 allowed remote attackers to cause a denial of service
(panic) via duplicate ASCONF chunks that trigger an incorrect uncork
within the side-effect interpreter (bnc#902349).
* CVE-2014-3673: The SCTP implementation in the Linux kernel through
3.17.2 allowed remote attackers to cause a denial of service (system
crash) via a malformed ASCONF chunk, related to
net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c (bnc#902346).
* CVE-2014-7841: The sctp_process_param function in
net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux
kernel before 3.17.4, when ASCONF is used, allowed remote attackers
to cause a denial of service (NULL pointer dereference and system
crash) via a malformed INIT chunk (bnc#905100).
* CVE-2014-8709: The ieee80211_fragment function in net/mac80211/tx.c
in the Linux kernel before 3.13.5 did not properly maintain a
certain tail pointer, which allowed remote attackers to obtain
sensitive cleartext information by reading packets (bnc#904700).
* CVE-2013-7263: The Linux kernel before 3.12.4 updated certain length
values before ensuring that associated data structures have been
initialized, which allowed local users to obtain sensitive
information from kernel stack memory via a (1) recvfrom, (2)
recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c,
net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c
(bnc#857643).
* CVE-2012-6657: The sock_setsockopt function in net/core/sock.c in
the Linux kernel before 3.5.7 did not ensure that a keepalive action
is associated with a stream socket, which allowed local users to
cause a denial of service (system crash) by leveraging the ability
to create a raw socket (bnc#896779).
* CVE-2014-3185: Multiple buffer overflows in the
command_port_read_callback function in
drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in
the Linux kernel before 3.16.2 allowed physically proximate
attackers to execute arbitrary code or cause a denial of service
(memory corruption and system crash) via a crafted device that
provides a large amount of (1) EHCI or (2) XHCI data associated with
a bulk response (bnc#896391).
* CVE-2014-3184: The report_fixup functions in the HID subsystem in
the Linux kernel before 3.16.2 might allow physically proximate
attackers to cause a denial of service (out-of-bounds write) via a
crafted device that provides a small report descriptor, related to
(1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3)
drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5)
drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c
(bnc#896390).
The following non-security bugs have been fixed:
* KVM: SVM: Make Use of the generic guest-mode functions (bnc#907822).
* KVM: inject #UD if instruction emulation fails and exit to userspace
(bnc#907822).
* block: Fix bogus partition statistics reports (bnc#885077
bnc#891211).
* block: skip request queue cleanup if no elevator is assigned
(bnc#899338).
* isofs: Fix unchecked printing of ER records.
* Re-enable nested-spinlocks-backport patch for xen (bnc#908870).
* time, ntp: Do not update time_state in middle of leap second
(bnc#912916).
* timekeeping: Avoid possible deadlock from clock_was_set_delayed
(bnc#771619, bnc#915335).
* udf: Check component length before reading it.
* udf: Check path length when reading symlink.
* udf: Verify i_size when loading inode.
* udf: Verify symlink size before loading it.
* vt: prevent race between modifying and reading unicode map
(bnc#915826).
* writeback: Do not sync data dirtied after sync start (bnc#833820).
* xfs: Avoid blocking on inode flush in background inode reclaim
(bnc#892235).
Security Issues:
* CVE-2010-5313
* CVE-2012-6657
* CVE-2013-4299
* CVE-2013-7263
* CVE-2014-0181
* CVE-2014-3184
* CVE-2014-3185
* CVE-2014-3673
* CVE-2014-3687
* CVE-2014-3688
* CVE-2014-7841
* CVE-2014-7842
* CVE-2014-8160
* CVE-2014-8709
* CVE-2014-9420
* CVE-2014-9584
* CVE-2014-9585
Announcement ID: | SUSE-SU-2015:0652-1 |
Rating: | important |
References: | #771619 #833820 #846404 #857643 #875051 #885077 #891211 #892235 #896390 #896391 #896779 #899338 #902346 #902349 #902351 #904700 #905100 #905312 #907822 #908870 #911325 #912654 #912705 #912916 #913059 #915335 #915826 |
Affected Products: |
An update that solves 17 vulnerabilities and has 10 fixes is now available. It includes one version update.
Description:
The SUSE Linux Enterprise 11 Service Pack 1 LTSS kernel was updated to fix
security issues on kernels on the x86_64 architecture.
The following security bugs have been fixed:
* CVE-2013-4299: Interpretation conflict in
drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6
allowed remote authenticated users to obtain sensitive information
or modify data via a crafted mapping to a snapshot block device
(bnc#846404).
* CVE-2014-8160: SCTP firewalling failed until the SCTP module was
loaded (bnc#913059).
* CVE-2014-9584: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel before 3.18.2 did not validate a
length value in the Extensions Reference (ER) System Use Field,
which allowed local users to obtain sensitive information from
kernel memory via a crafted iso9660 image (bnc#912654).
* CVE-2014-9585: The vdso_addr function in arch/x86/vdso/vma.c in the
Linux kernel through 3.18.2 did not properly choose memory locations
for the vDSO area, which made it easier for local users to bypass
the ASLR protection mechanism by guessing a location at the end of a
PMD (bnc#912705).
* CVE-2014-9420: The rock_continue function in fs/isofs/rock.c in the
Linux kernel through 3.18.1 did not restrict the number of Rock
Ridge continuation entries, which allowed local users to cause a
denial of service (infinite loop, and system crash or hang) via a
crafted iso9660 image (bnc#911325).
* CVE-2014-0181: The Netlink implementation in the Linux kernel
through 3.14.1 did not provide a mechanism for authorizing socket
operations based on the opener of a socket, which allowed local
users to bypass intended access restrictions and modify network
configurations by using a Netlink socket for the (1) stdout or (2)
stderr of a setuid program (bnc#875051).
* CVE-2010-5313: Race condition in arch/x86/kvm/x86.c in the Linux
kernel before 2.6.38 allowed L2 guest OS users to cause a denial of
service (L1 guest OS crash) via a crafted instruction that triggers
an L2 emulation failure report, a similar issue to CVE-2014-7842
(bnc#907822).
* CVE-2014-7842: Race condition in arch/x86/kvm/x86.c in the Linux
kernel before 3.17.4 allowed guest OS users to cause a denial of
service (guest OS crash) via a crafted application that performs an
MMIO transaction or a PIO transaction to trigger a guest userspace
emulation error report, a similar issue to CVE-2010-5313
(bnc#905312).
* CVE-2014-3688: The SCTP implementation in the Linux kernel before
3.17.4 allowed remote attackers to cause a denial of service (memory
consumption) by triggering a large number of chunks in an
associations output queue, as demonstrated by ASCONF probes, related
to net/sctp/inqueue.c and net/sctp/sm_statefuns.c (bnc#902351).
* CVE-2014-3687: The sctp_assoc_lookup_asconf_ack function in
net/sctp/associola.c in the SCTP implementation in the Linux kernel
through 3.17.2 allowed remote attackers to cause a denial of service
(panic) via duplicate ASCONF chunks that trigger an incorrect uncork
within the side-effect interpreter (bnc#902349).
* CVE-2014-3673: The SCTP implementation in the Linux kernel through
3.17.2 allowed remote attackers to cause a denial of service (system
crash) via a malformed ASCONF chunk, related to
net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c (bnc#902346).
* CVE-2014-7841: The sctp_process_param function in
net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux
kernel before 3.17.4, when ASCONF is used, allowed remote attackers
to cause a denial of service (NULL pointer dereference and system
crash) via a malformed INIT chunk (bnc#905100).
* CVE-2014-8709: The ieee80211_fragment function in net/mac80211/tx.c
in the Linux kernel before 3.13.5 did not properly maintain a
certain tail pointer, which allowed remote attackers to obtain
sensitive cleartext information by reading packets (bnc#904700).
* CVE-2013-7263: The Linux kernel before 3.12.4 updated certain length
values before ensuring that associated data structures have been
initialized, which allowed local users to obtain sensitive
information from kernel stack memory via a (1) recvfrom, (2)
recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c,
net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c
(bnc#857643).
* CVE-2012-6657: The sock_setsockopt function in net/core/sock.c in
the Linux kernel before 3.5.7 did not ensure that a keepalive action
is associated with a stream socket, which allowed local users to
cause a denial of service (system crash) by leveraging the ability
to create a raw socket (bnc#896779).
* CVE-2014-3185: Multiple buffer overflows in the
command_port_read_callback function in
drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in
the Linux kernel before 3.16.2 allowed physically proximate
attackers to execute arbitrary code or cause a denial of service
(memory corruption and system crash) via a crafted device that
provides a large amount of (1) EHCI or (2) XHCI data associated with
a bulk response (bnc#896391).
* CVE-2014-3184: The report_fixup functions in the HID subsystem in
the Linux kernel before 3.16.2 might allow physically proximate
attackers to cause a denial of service (out-of-bounds write) via a
crafted device that provides a small report descriptor, related to
(1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3)
drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5)
drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c
(bnc#896390).
The following non-security bugs have been fixed:
* KVM: SVM: Make Use of the generic guest-mode functions (bnc#907822).
* KVM: inject #UD if instruction emulation fails and exit to userspace
(bnc#907822).
* block: Fix bogus partition statistics reports (bnc#885077
bnc#891211).
* block: skip request queue cleanup if no elevator is assigned
(bnc#899338).
* isofs: Fix unchecked printing of ER records.
* Re-enable nested-spinlocks-backport patch for xen (bnc#908870).
* time, ntp: Do not update time_state in middle of leap second
(bnc#912916).
* timekeeping: Avoid possible deadlock from clock_was_set_delayed
(bnc#771619, bnc#915335).
* udf: Check component length before reading it.
* udf: Check path length when reading symlink.
* udf: Verify i_size when loading inode.
* udf: Verify symlink size before loading it.
* vt: prevent race between modifying and reading unicode map
(bnc#915826).
* writeback: Do not sync data dirtied after sync start (bnc#833820).
* xfs: Avoid blocking on inode flush in background inode reclaim
(bnc#892235).
Security Issues:
* CVE-2010-5313
* CVE-2012-6657
* CVE-2013-4299
* CVE-2013-7263
* CVE-2014-0181
* CVE-2014-3184
* CVE-2014-3185
* CVE-2014-3673
* CVE-2014-3687
* CVE-2014-3688
* CVE-2014-7841
* CVE-2014-7842
* CVE-2014-8160
* CVE-2014-8709
* CVE-2014-9420
* CVE-2014-9584
* CVE-2014-9585
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP1 LTSS:
zypper in -t patch slessp1-kernel=10315 slessp1-kernel=10316 slessp1-kernel=10317
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 2.6.32.59]:
- kernel-default-2.6.32.59-0.19.1
- kernel-default-base-2.6.32.59-0.19.1
- kernel-default-devel-2.6.32.59-0.19.1
- kernel-source-2.6.32.59-0.19.1
- kernel-syms-2.6.32.59-0.19.1
- kernel-trace-2.6.32.59-0.19.1
- kernel-trace-base-2.6.32.59-0.19.1
- kernel-trace-devel-2.6.32.59-0.19.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 x86_64) [New Version: 2.6.32.59]:
- kernel-ec2-2.6.32.59-0.19.1
- kernel-ec2-base-2.6.32.59-0.19.1
- kernel-ec2-devel-2.6.32.59-0.19.1
- kernel-xen-2.6.32.59-0.19.1
- kernel-xen-base-2.6.32.59-0.19.1
- kernel-xen-devel-2.6.32.59-0.19.1
- xen-kmp-default-4.0.3_21548_18_2.6.32.59_0.19-0.9.17
- xen-kmp-trace-4.0.3_21548_18_2.6.32.59_0.19-0.9.17
- SUSE Linux Enterprise Server 11 SP1 LTSS (s390x) [New Version: 2.6.32.59]:
- kernel-default-man-2.6.32.59-0.19.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586) [New Version: 2.6.32.59]:
- kernel-pae-2.6.32.59-0.19.1
- kernel-pae-base-2.6.32.59-0.19.1
- kernel-pae-devel-2.6.32.59-0.19.1
- xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.9.17
- SLE 11 SERVER Unsupported Extras (i586 s390x x86_64):
- kernel-default-extra-2.6.32.59-0.19.1
- SLE 11 SERVER Unsupported Extras (i586 x86_64):
- kernel-xen-extra-2.6.32.59-0.19.1
- SLE 11 SERVER Unsupported Extras (i586):
- kernel-pae-extra-2.6.32.59-0.19.1
References:
- https://www.suse.com/security/cve/CVE-2010-5313.html
- https://www.suse.com/security/cve/CVE-2012-6657.html
- https://www.suse.com/security/cve/CVE-2013-4299.html
- https://www.suse.com/security/cve/CVE-2013-7263.html
- https://www.suse.com/security/cve/CVE-2014-0181.html
- https://www.suse.com/security/cve/CVE-2014-3184.html
- https://www.suse.com/security/cve/CVE-2014-3185.html
- https://www.suse.com/security/cve/CVE-2014-3673.html
- https://www.suse.com/security/cve/CVE-2014-3687.html
- https://www.suse.com/security/cve/CVE-2014-3688.html
- https://www.suse.com/security/cve/CVE-2014-7841.html
- https://www.suse.com/security/cve/CVE-2014-7842.html
- https://www.suse.com/security/cve/CVE-2014-8160.html
- https://www.suse.com/security/cve/CVE-2014-8709.html
- https://www.suse.com/security/cve/CVE-2014-9420.html
- https://www.suse.com/security/cve/CVE-2014-9584.html
- https://www.suse.com/security/cve/CVE-2014-9585.html
- https://bugzilla.suse.com/771619
- https://bugzilla.suse.com/833820
- https://bugzilla.suse.com/846404
- https://bugzilla.suse.com/857643
- https://bugzilla.suse.com/875051
- https://bugzilla.suse.com/885077
- https://bugzilla.suse.com/891211
- https://bugzilla.suse.com/892235
- https://bugzilla.suse.com/896390
- https://bugzilla.suse.com/896391
- https://bugzilla.suse.com/896779
- https://bugzilla.suse.com/899338
- https://bugzilla.suse.com/902346
- https://bugzilla.suse.com/902349
- https://bugzilla.suse.com/902351
- https://bugzilla.suse.com/904700
- https://bugzilla.suse.com/905100
- https://bugzilla.suse.com/905312
- https://bugzilla.suse.com/907822
- https://bugzilla.suse.com/908870
- https://bugzilla.suse.com/911325
- https://bugzilla.suse.com/912654
- https://bugzilla.suse.com/912705
- https://bugzilla.suse.com/912916
- https://bugzilla.suse.com/913059
- https://bugzilla.suse.com/915335
- https://bugzilla.suse.com/915826
- https://download.suse.com/patch/finder/?keywords=01007b3b761286f24a9cd5a7197794e2
- https://download.suse.com/patch/finder/?keywords=8944e139fcc8a84a52412d23cce7f98a
- https://download.suse.com/patch/finder/?keywords=a5e2892de750f2c5d2fba65db2f8b808
- https://download.suse.com/patch/finder/?keywords=afe31f60701fa39738b0574722eb95ef
- https://download.suse.com/patch/finder/?keywords=cfbfe04e5c8b61b50f91d849de2217e9
- https://download.suse.com/patch/finder/?keywords=ef5762f62e2e26eab3ef31d6b58ad159