Newest Plugins

OpenSSH SSHFP Record Verification Weakness


Synopsis:

A secure shell client on the remote host could be used to bypass host
verification methods.

Description:

According to its banner, the version of OpenSSH running on the remote
host is 6.1 through 6.6.

It is, therefore, affected by a host verification bypass vulnerability
related to SSHFP and certificates that could allow a malicious SSH
server to cause the supplied client to inappropriately trust the
server.

See also :

http://thread.gmane.org/gmane.network.openssh.devel/20679
http://tools.ietf.org/html/rfc4255
http://seclists.org/oss-sec/2014/q1/663

Solution :

Update to version 6.7 or later or apply the vendor patch.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Ubuntu 14.04 : openjdk-7 vulnerabilities (USN-2388-1)


Synopsis:

The remote Ubuntu host is missing one or more security-related patches.

Description:

A vulnerability was discovered in the OpenJDK JRE related to
information disclosure and data integrity. An attacker could exploit
this to expose sensitive data over the network. (CVE-2014-6457)

Several vulnerabilities were discovered in the OpenJDK JRE related to
data integrity. (CVE-2014-6502, CVE-2014-6512, CVE-2014-6519,
CVE-2014-6527, CVE-2014-6558)

Several vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure. An attacker could exploit these to expose
sensitive data over the network. (CVE-2014-6504, CVE-2014-6511,
CVE-2014-6517, CVE-2014-6531)

Two vulnerabilities were discovered in the OpenJDK JRE related to
information disclosure, data integrity and availability. An attacker
could exploit these to cause a denial of service or expose sensitive
data over the network. (CVE-2014-6506, CVE-2014-6513).

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Ubuntu Security Notice (C) 2014 Canonical, Inc. / NASL script (C) 2014 Tenable Network Security, Inc.

Ubuntu 14.04 : pollinate update (USN-2387-1)


Synopsis:

The remote Ubuntu host is missing a security-related patch.

Description:

The pollinate package bundles the certificate for entropy.ubuntu.com.
This update refreshes the certificate to match the one currently used
on the server.

Solution :

Update the affected pollinate package.

Risk factor :

High

Ubuntu Security Notice (C) 2014 Canonical, Inc. / NASL script (C) 2014 Tenable Network Security, Inc.

SuSE 11.3 Security Update : Xen (SAT Patch Number 9828)


Synopsis:

The remote SuSE 11 host is missing one or more security updates.

Description:

The SUSE Linux Enterprise 11 Service Pack 3 Xen package was updated to
fix various bugs and security issues.

The following security issues have been fixed :

- XSA-108: CVE-2014-7188: Improper MSR range used for
x2APIC emulation. (bnc#897657)

- XSA-106: CVE-2014-7156: Missing privilege level checks
in x86 emulation of software interrupts. (bnc#895802)

- XSA-105: CVE-2014-7155: Missing privilege level checks
in x86 HLT, LGDT, LIDT, and LMSW emulation. (bnc#895799)

- XSA-104: CVE-2014-7154: Race condition in
HVMOP_track_dirty_vram. (bnc#895798)

- XSA-100: CVE-2014-4021: Hypervisor heap contents leaked
to guests. (bnc#880751)

- XSA-96: CVE-2014-3967 / CVE-2014-3968: Vulnerabilities
in HVM MSI injection. (bnc#878841)

- XSA-89: CVE-2014-2599: HVMOP_set_mem_access is not
preemptible. (bnc#867910)

- XSA-65: CVE-2013-4344: qemu SCSI REPORT LUNS buffer
overflow. (bnc#842006)

- qemu: zaurus: buffer overrun on invalid state load
(bnc#864801) The following non-security issues have been
fixed:. (CVE-2013-4540)

- xend: Fix netif convertToDeviceNumber for running
domains. (bnc#891539)

- Installing SLES12 as a VM on SLES11 SP3 fails because of
btrfs in the VM. (bnc#882092)

- XEN kernel panic do_device_not_available(). (bnc#881900)

- Boot Failure with xen kernel in UEFI mode with error 'No
memory for trampoline'. (bnc#833483)

- SLES 11 SP3 vm-install should get RHEL 7 support when
released. (bnc#862608)

- SLES 11 SP3 XEN kiso version cause softlockup on 8
blades npar(480 cpu). (bnc#858178)

- Local attach support for PHY backends using scripts
local_attach_support_for_phy.patch. (bnc#865682)

- Improve multipath support for npiv devices block-npiv
(bnc#798770)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=798770
https://bugzilla.novell.com/show_bug.cgi?id=833483
https://bugzilla.novell.com/show_bug.cgi?id=842006
https://bugzilla.novell.com/show_bug.cgi?id=858178
https://bugzilla.novell.com/show_bug.cgi?id=862608
https://bugzilla.novell.com/show_bug.cgi?id=864801
https://bugzilla.novell.com/show_bug.cgi?id=865682
https://bugzilla.novell.com/show_bug.cgi?id=867910
https://bugzilla.novell.com/show_bug.cgi?id=878841
https://bugzilla.novell.com/show_bug.cgi?id=880751
https://bugzilla.novell.com/show_bug.cgi?id=881900
https://bugzilla.novell.com/show_bug.cgi?id=882092
https://bugzilla.novell.com/show_bug.cgi?id=891539
https://bugzilla.novell.com/show_bug.cgi?id=895798
https://bugzilla.novell.com/show_bug.cgi?id=895799
https://bugzilla.novell.com/show_bug.cgi?id=895802
https://bugzilla.novell.com/show_bug.cgi?id=897657
http://support.novell.com/security/cve/CVE-2013-4344.html
http://support.novell.com/security/cve/CVE-2013-4540.html
http://support.novell.com/security/cve/CVE-2014-2599.html
http://support.novell.com/security/cve/CVE-2014-3967.html
http://support.novell.com/security/cve/CVE-2014-3968.html
http://support.novell.com/security/cve/CVE-2014-4021.html
http://support.novell.com/security/cve/CVE-2014-7154.html
http://support.novell.com/security/cve/CVE-2014-7155.html
http://support.novell.com/security/cve/CVE-2014-7156.html
http://support.novell.com/security/cve/CVE-2014-7188.html

Solution :

Apply SAT patch number 9828.

Risk factor :

High / CVSS Base Score : 8.3
(CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

SuSE 11.3 Security Update : Linux kernel (SAT Patch Number 9750)


Synopsis:

The remote SuSE 11 host is missing one or more security updates.

Description:

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to
fix various bugs and security issues.

The following security bugs have been fixed :

- The media_device_enum_entities function in
drivers/media/media-device.c in the Linux kernel before
3.14.6 does not initialize a certain data structure,
which allows local users to obtain sensitive information
from kernel memory by leveraging /dev/media0 read access
for a MEDIA_IOC_ENUM_ENTITIES ioctl call. (bnc#882804).
(CVE-2014-1739)

- mm/shmem.c in the Linux kernel through 3.15.1 does not
properly implement the interaction between range
notification and hole punching, which allows local users
to cause a denial of service (i_mutex hold) by using the
mmap system call to access a hole, as demonstrated by
interfering with intended shmem activity by blocking
completion of (1) an MADV_REMOVE madvise call or (2) an
FALLOC_FL_PUNCH_HOLE fallocate call. (bnc#883518).
(CVE-2014-4171)

- arch/x86/kernel/entry_32.S in the Linux kernel through
3.15.1 on 32-bit x86 platforms, when syscall auditing is
enabled and the sep CPU feature flag is set, allows
local users to cause a denial of service (OOPS and
system crash) via an invalid syscall number, as
demonstrated by number 1000. (bnc#883724).
(CVE-2014-4508)

- The sctp_association_free function in
net/sctp/associola.c in the Linux kernel before 3.15.2
does not properly manage a certain backlog value, which
allows remote attackers to cause a denial of service
(socket outage) via a crafted SCTP packet. (bnc#885422).
(CVE-2014-4667)

- The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux
kernel through 3.15.6 allows local users to gain
privileges by leveraging data-structure differences
between an l2tp socket and an inet socket. (bnc#887082).
(CVE-2014-4943)

- The sctp_assoc_update function in net/sctp/associola.c
in the Linux kernel through 3.15.8, when SCTP
authentication is enabled, allows remote attackers to
cause a denial of service (NULL pointer dereference and
OOPS) by starting to establish an association between
two endpoints immediately after an exchange of INIT and
INIT ACK chunks to establish an earlier association
between these endpoints in the opposite direction.
(bnc#889173). (CVE-2014-5077)

- Stack consumption vulnerability in the
parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel through 3.16.1
allows local users to cause a denial of service
(uncontrolled recursion, and system crash or reboot) via
a crafted iso9660 image with a CL entry referring to a
directory entry that has a CL entry. (bnc#892490).
(CVE-2014-5471)

- The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel through 3.16.1
allows local users to cause a denial of service
(unkillable mount process) via a crafted iso9660 image
with a self-referential CL entry. (bnc#892490).
(CVE-2014-5472)

- Race condition in the mac80211 subsystem in the Linux
kernel before 3.13.7 allows remote attackers to cause a
denial of service (system crash) via network traffic
that improperly interacts with the WLAN_STA_PS_STA state
(aka power-save mode), related to sta_info.c and tx.c.
(bnc#871797). (CVE-2014-2706)

- The rd_build_device_space function in
drivers/target/target_core_rd.c in the Linux kernel
before 3.14 does not properly initialize a certain data
structure, which allows local users to obtain sensitive
information from ramdisk_mcp memory by leveraging access
to a SCSI initiator. (bnc#882639). (CVE-2014-4027)

- The futex_requeue function in kernel/futex.c in the
Linux kernel through 3.14.5 does not ensure that calls
have two different futex addresses, which allows local
users to gain privileges via a crafted FUTEX_REQUEUE
command that facilitates unsafe waiter modification.
(bnc#880892). (CVE-2014-3153)

- Avoid infinite loop when processing indirect ICBs
(bnc#896689) The following non-security bugs have been
fixed:. (CVE-2014-6410)

- ACPI / PAD: call schedule() when need_resched() is true.
(bnc#866911)

- ACPI: Fix bug when ACPI reset register is implemented in
system memory. (bnc#882900)

- ACPI: Limit access to custom_method. (bnc#884333)

- ALSA: hda - Enabling Realtek ALC 671 codec. (bnc#891746)

- Add option to automatically enforce module signatures
when in Secure Boot mode. (bnc#884333)

- Add secure_modules() call. (bnc#884333)

- Add wait_on_atomic_t() and wake_up_atomic_t().
(bnc#880344)

- Backported new patches of Lock down functions for UEFI
secure boot Also updated series.conf and removed old
patches.

- Btrfs: Return EXDEV for cross file system snapshot.

- Btrfs: abort the transaction when we does not find our
extent ref.

- Btrfs: avoid warning bomb of btrfs_invalidate_inodes.

- Btrfs: cancel scrub on transaction abortion.

- Btrfs: correctly set profile flags on seqlock retry.

- Btrfs: does not check nodes for extent items.

- Btrfs: fix a possible deadlock between scrub and
transaction committing.

- Btrfs: fix corruption after write/fsync failure + fsync
+ log recovery. (bnc#894200)

- Btrfs: fix csum tree corruption, duplicate and outdated
checksums. (bnc#891619)

- Btrfs: fix double free in find_lock_delalloc_range.

- Btrfs: fix possible memory leak in btrfs_create_tree().

- Btrfs: fix use of uninit 'ret' in
end_extent_writepage().

- Btrfs: free delayed node outside of root->inode_lock.
(bnc#866864)

- Btrfs: make DEV_INFO ioctl available to anyone.

- Btrfs: make FS_INFO ioctl available to anyone.

- Btrfs: make device scan less noisy.

- Btrfs: make sure there are not any read requests before
stopping workers.

- Btrfs: more efficient io tree navigation on
wait_extent_bit.

- Btrfs: output warning instead of error when loading free
space cache failed.

- Btrfs: retrieve more info from FS_INFO ioctl.

- Btrfs: return EPERM when deleting a default subvolume.
(bnc#869934)

- Btrfs: unset DCACHE_DISCONNECTED when mounting default
subvol. (bnc#866615)

- Btrfs: use right type to get real comparison.

- Btrfs: wake up @scrub_pause_wait as much as we can.

- Btrfs: wake up transaction thread upon remount.

- CacheFiles: Add missing retrieval completions.
(bnc#880344)

- CacheFiles: Does not try to dump the index key if the
cookie has been cleared. (bnc#880344)

- CacheFiles: Downgrade the requirements passed to the
allocator. (bnc#880344)

- CacheFiles: Fix the marking of cached pages.
(bnc#880344)

- CacheFiles: Implement invalidation. (bnc#880344)

- CacheFiles: Make some debugging statements conditional.
(bnc#880344)

- Drivers: hv: util: Fix a bug in the KVP code.
(bnc#886840)

- Drivers: hv: vmbus: Fix a bug in the channel callback
dispatch code. (bnc#886840)

- FS-Cache: Add transition to handle invalidate
immediately after lookup. (bnc#880344)

- FS-Cache: Check that there are no read ops when cookie
relinquished. (bnc#880344)

- FS-Cache: Clear remaining page count on retrieval
cancellation. (bnc#880344)

- FS-Cache: Convert the object event ID #defines into an
enum. (bnc#880344)

- FS-Cache: Does not sleep in page release if __GFP_FS is
not set. (bnc#880344)

- FS-Cache: Does not use spin_is_locked() in assertions.
(bnc#880344)

- FS-Cache: Exclusive op submission can BUG if there is
been an I/O error. (bnc#880344)

- FS-Cache: Fix __wait_on_atomic_t() to call the action
func if the counter != 0. (bnc#880344)

- FS-Cache: Fix object state machine to have separate work
and wait states. (bnc#880344)

- FS-Cache: Fix operation state management and accounting.
(bnc#880344)

- FS-Cache: Fix signal handling during waits. (bnc#880344)

- FS-Cache: Initialise the object event mask with the
calculated mask. (bnc#880344)

- FS-Cache: Limit the number of I/O error reports for a
cache. (bnc#880344)

- FS-Cache: Make cookie relinquishment wait for
outstanding reads. (bnc#880344)

- FS-Cache: Mark cancellation of in-progress operation.
(bnc#880344)

- FS-Cache: One of the write operation paths doeses not
set the object state. (bnc#880344)

- FS-Cache: Provide proper invalidation. (bnc#880344)

- FS-Cache: Simplify cookie retention for fscache_objects,
fixing oops. (bnc#880344)

- FS-Cache: The retrieval remaining-pages counter needs to
be atomic_t. (bnc#880344)

- FS-Cache: Uninline fscache_object_init(). (bnc#880344)

- FS-Cache: Wrap checks on object state. (bnc#880344)

- HID: usbhid: add always-poll quirk. (bnc#888607)

- HID: usbhid: enable always-poll quirk for Elan
Touchscreen. (bnc#888607)

- IB/iser: Add TIMEWAIT_EXIT event handling. (bnc#890297)

- Ignore 'flags' change to event_constraint. (bnc#876114)

- Ignore data_src/weight changes to perf_sample_data.
(bnc#876114)

- NFS: Allow more operations in an NFSv4.1 request.
(bnc#890513)

- NFS: Clean up helper function nfs4_select_rw_stateid().
(bnc#888968)

- NFS: Does not copy read delegation stateids in setattr.
(bnc#888968)

- NFS: Does not use a delegation to open a file when
returning that delegation. (bnc#888968, bnc#892200,
bnc#893596, bnc#893496)

- NFS: Fixes for NFS RCU-walk support in line with code
going upstream

- NFS: Use FS-Cache invalidation. (bnc#880344)

- NFS: allow lockless access to access_cache. (bnc#866130)

- NFS: avoid mountpoint being displayed as ' (deleted)' in
/proc/mounts. (bnc#888591)

- NFS: nfs4_do_open should add negative results to the
dcache. (bnc#866130)

- NFS: nfs_migrate_page() does not wait for FS-Cache to
finish with a page. (bnc#880344)

- NFS: nfs_open_revalidate: only evaluate parent if it
will be used. (bnc#866130)

- NFS: prepare for RCU-walk support but pushing tests
later in code. (bnc#866130)

- NFS: support RCU_WALK in nfs_permission(). (bnc#866130)

- NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU.
(bnc#866130)

- NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU.
(bnc#866130)

- NFSD: Does not hand out delegations for 30 seconds after
recalling them. (bnc#880370)

- NFSv4 set open access operation call flag in
nfs4_init_opendata_res. (bnc#888968, bnc#892200,
bnc#893596, bnc#893496)

- NFSv4: Add a helper for encoding opaque data.
(bnc#888968)

- NFSv4: Add a helper for encoding stateids. (bnc#888968)

- NFSv4: Add helpers for basic copying of stateids.
(bnc#888968)

- NFSv4: Clean up nfs4_select_rw_stateid(). (bnc#888968)

- NFSv4: Fix the return value of nfs4_select_rw_stateid.
(bnc#888968)

- NFSv4: Rename nfs4_copy_stateid(). (bnc#888968)

- NFSv4: Resend the READ/WRITE RPC call if a stateid
change causes an error. (bnc#888968)

- NFSv4: Simplify the struct nfs4_stateid. (bnc#888968)

- NFSv4: The stateid must remain the same for replayed RPC
calls. (bnc#888968)

- NFSv4: nfs4_stateid_is_current should return 'true' for
an invalid stateid. (bnc#888968)

- One more fix for kABI breakage.

- PCI: Lock down BAR access when module security is
enabled. (bnc#884333)

- PCI: enable MPS 'performance' setting to properly handle
bridge MPS. (bnc#883376)

- PM / Hibernate: Add memory_rtree_find_bit function.
(bnc#860441)

- PM / Hibernate: Create a Radix-Tree to store memory
bitmap. (bnc#860441)

- PM / Hibernate: Implement position keeping in radix
tree. (bnc#860441)

- PM / Hibernate: Iterate over set bits instead of PFNs in
swsusp_free(). (bnc#860441)

- PM / Hibernate: Remove the old memory-bitmap
implementation. (bnc#860441)

- PM / Hibernate: Touch Soft Lockup Watchdog in
rtree_next_node. (bnc#860441)

- Restrict /dev/mem and /dev/kmem when module loading is
restricted. (bnc#884333)

- Reuse existing 'state' field to indicate
PERF_X86_EVENT_PEBS_LDLAT. (bnc#876114)

- USB: handle LPM errors during device suspend correctly.
(bnc#849123)

- Update kabi files to reflect fscache change.
(bnc#880344)

- Update x86_64 config files: re-enable SENSORS_W83627EHF.
(bnc#891281)

- VFS: Make more complete truncate operation available to
CacheFiles. (bnc#880344)

- [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger
(FATE#83366, ltc#83367).

- acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted. (bnc#884333)

- af_iucv: correct cleanup if listen backlog is full
(bnc#885262, LTC#111728).

- asus-wmi: Restrict debugfs interface when module loading
is restricted. (bnc#884333)

- autofs4: allow RCU-walk to walk through autofs4.
(bnc#866130)

- autofs4: avoid taking fs_lock during rcu-walk.
(bnc#866130)

- autofs4: does not take spinlock when not needed in
autofs4_lookup_expiring. (bnc#866130)

- autofs4: factor should_expire() out of
autofs4_expire_indirect. (bnc#866130)

- autofs4: make 'autofs4_can_expire' idempotent.
(bnc#866130)

- autofs4: remove a redundant assignment. (bnc#866130)

- autofs: fix lockref lookup. (bnc#888591)

- be2net: add dma_mapping_error() check for
dma_map_page(). (bnc#881759)

- block: add cond_resched() to potentially long running
ioctl discard loop. (bnc#884725)

- block: fix race between request completion and timeout
handling. (bnc#881051)

- cdc-ether: clean packet filter upon probe. (bnc#876017)

- cpuset: Fix memory allocator deadlock. (bnc#876590)

- crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not
all archs have them, but some are FIPS certified, with
some kernel support.

- crypto: fips - only panic on bad/missing crypto mod
signatures. (bnc#887503)

- crypto: testmgr - allow aesni-intel and
ghash_clmulni-intel in fips mode. (bnc#889451)

- dasd: validate request size before building CCW/TCW
(bnc#891087, LTC#114068).

- dm mpath: fix race condition between multipath_dtr and
pg_init_done. (bnc#826486)

- dm-mpath: fix panic on deleting sg device. (bnc#870161)

- drm/ast: AST2000 cannot be detected correctly.
(bnc#895983)

- drm/ast: Actually load DP501 firmware when required.
(bnc#895608 / bnc#871134)

- drm/ast: Add missing entry to dclk_table[].

- drm/ast: Add reduced non reduced mode parsing for wide
screen mode. (bnc#892723)

- drm/ast: initial DP501 support (v0.2). (bnc#871134)

- drm/ast: open key before detect chips. (bnc#895983)

- drm/i915: Fix up cpt pixel multiplier enable sequence.
(bnc#879304)

- drm/i915: Only apply DPMS to the encoder if enabled.
(bnc#893064)

- drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver
init. (bnc#869055)

- drm/i915: create functions for the 'unclaimed register'
checks. (bnc#869055)

- drm/i915: use FPGA_DBG for the 'unclaimed register'
checks. (bnc#869055)

- drm/mgag200: Initialize data needed to map fbdev memory.
(bnc#806990)

- e1000e: enable support for new device IDs. (bnc#885509)

- fs/fscache: remove spin_lock() from the condition in
while(). (bnc#880344)

- hibernate: Disable in a signed modules environment.
(bnc#884333)

- hugetlb: does not use ERR_PTR with VM_FAULT* values

- ibmvscsi: Abort init sequence during error recovery.
(bnc#885382)

- ibmvscsi: Add memory barriers for send / receive.
(bnc#885382)

- inet: add a redirect generation id in inetpeer.
(bnc#860593)

- inetpeer: initialize ->redirect_genid in inet_getpeer().
(bnc#860593)

- ipv6: tcp: fix tcp_v6_conn_request(). (bnc#887645)

- kabi: hide bnc#860593 changes of struct
inetpeer_addr_base. (bnc#860593)

- kernel: 3215 tty hang (bnc#891087, LTC#114562).

- kernel: fix data corruption when reading /proc/sysinfo
(bnc#891087, LTC#114480).

- kernel: fix kernel oops with load of fpc register
(bnc#889061, LTC#113596).

- kernel: sclp console tty reference counting (bnc#891087,
LTC#115466).

- kexec: Disable at runtime if the kernel enforces module
loading restrictions. (bnc#884333)

- md/raid6: avoid data corruption during recovery of
double-degraded RAID6.

- memcg, vmscan: Fix forced scan of anonymous pages
(memory reclaim fix).

- memcg: do not expose uninitialized mem_cgroup_per_node
to world. (bnc#883096)

- mm, hugetlb: add VM_NORESERVE check in
vma_has_reserves()

- mm, hugetlb: change variable name reservations to resv

- mm, hugetlb: decrement reserve count if VM_NORESERVE
alloc page cache

- mm, hugetlb: defer freeing pages when gathering surplus
pages

- mm, hugetlb: do not use a page in page cache for cow
optimization

- mm, hugetlb: fix and clean-up node iteration code to
alloc or free

- mm, hugetlb: fix race in region tracking

- mm, hugetlb: fix subpool accounting handling

- mm, hugetlb: improve page-fault scalability

- mm, hugetlb: improve, cleanup resv_map parameters

- mm, hugetlb: move up the code which check availability
of free huge page

- mm, hugetlb: protect reserved pages when soft offlining
a hugepage

- mm, hugetlb: remove decrement_hugepage_resv_vma()

- mm, hugetlb: remove redundant list_empty check in
gather_surplus_pages()

- mm, hugetlb: remove resv_map_put

- mm, hugetlb: remove useless check about mapping type

- mm, hugetlb: return a reserved page to a reserved pool
if failed

- mm, hugetlb: trivial commenting fix

- mm, hugetlb: unify region structure handling

- mm, hugetlb: unify region structure handling kabi

- mm, hugetlb: use long vars instead of int in
region_count() (Hugetlb Fault Scalability).

- mm, hugetlb: use vma_resv_map() map types

- mm, oom: fix badness score underflow. (bnc#884582,
bnc#884767)

- mm, oom: normalize oom scores to oom_score_adj scale
only for userspace. (bnc#884582, bnc#884767)

- mm, thp: do not allow thp faults to avoid cpuset
restrictions. (bnc#888849)

- net/mlx4_core: Load higher level modules according to
ports type. (bnc#887680)

- net/mlx4_core: Load the IB driver when the device
supports IBoE. (bnc#887680)

- net/mlx4_en: Fix a race between napi poll function and
RX ring cleanup. (bnc#863586)

- net/mlx4_en: Fix selftest failing on non 10G link speed.
(bnc#888058)

- net: fix checksumming features handling in output path.
(bnc#891259)

- pagecache_limit: batch large nr_to_scan targets.
(bnc#895221)

- pagecachelimit: reduce lru_lock congestion for heavy
parallel reclaim fix. (bnc#895680)

- perf/core: Add weighted samples. (bnc#876114)

- perf/x86: Add flags to event constraints. (bnc#876114)

- perf/x86: Add memory profiling via PEBS Load Latency.
(bnc#876114)

- perf: Add generic memory sampling interface.
(bnc#876114)

- qla2xxx: Avoid escalating the SCSI error handler if the
command is not found in firmware. (bnc#859840)

- qla2xxx: Clear loop_id for ports that are marked lost
during fabric scanning. (bnc#859840)

- qla2xxx: Does not check for firmware hung during the
reset context for ISP82XX. (bnc#859840)

- qla2xxx: Issue abort command for outstanding commands
during cleanup when only firmware is alive. (bnc#859840)

- qla2xxx: Reduce the time we wait for a command to
complete during SCSI error handling. (bnc#859840)

- qla2xxx: Set host can_queue value based on available
resources. (bnc#859840)

- restore smp_mb() in unlock_new_inode(). (bnc#890526)

- s390/pci: introduce lazy IOTLB flushing for DMA unmap
(bnc#889061, LTC#113725).

- sched: fix the theoretical signal_wake_up() vs
schedule() race. (bnc#876055)

- sclp_vt220: Enable integrated ASCII console per default
(bnc#885262, LTC#112035).

- scsi_dh: use missing accessor 'scsi_device_from_queue'.
(bnc#889614)

- scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail.
(bnc#887608)

- scsiback: correct grant page unmapping.

- scsiback: fix retry handling in __report_luns().

- scsiback: free resources after error.

- sunrpc/auth: allow lockless (rcu) lookup of credential
cache. (bnc#866130)

- supported.conf: remove external from drivers/net/veth.
(bnc#889727)

- supported.conf: support net/sched/act_police.ko.
(bnc#890426)

- tcp: adapt selected parts of RFC 5682 and PRR logic.
(bnc#879921)

- tg3: Change nvram command timeout value to 50ms.
(bnc#855657)

- tg3: Override clock, link aware and link idle mode
during NVRAM dump. (bnc#855657)

- tg3: Set the MAC clock to the fastest speed during boot
code load. (bnc#855657)

- usb: Does not enable LPM if the exit latency is zero.
(bnc#832309)

- usbcore: Does not log on consecutive debounce failures
of the same port. (bnc#888105)

- usbhid: fix PIXART optical mouse. (bnc#888607)

- uswsusp: Disable when module loading is restricted.
(bnc#884333)

- vscsi: support larger transfer sizes. (bnc#774818)

- writeback: Do not sync data dirtied after sync start.
(bnc#833820)

- x86 thermal: Delete power-limit-notification console
messages. (bnc#882317)

- x86 thermal: Disable power limit notification interrupt
by default. (bnc#882317)

- x86 thermal: Re-enable power limit notification
interrupt by default. (bnc#882317)

- x86, cpu hotplug: Fix stack frame warning in
check_irq_vectors_for_cpu_disable(). (bnc#887418)

- x86/UV: Add call to KGDB/KDB from NMI handler.
(bnc#888847)

- x86/UV: Add kdump to UV NMI handler. (bnc#888847)

- x86/UV: Add summary of cpu activity to UV NMI handler.
(bnc#888847)

- x86/UV: Move NMI support. (bnc#888847)

- x86/UV: Update UV support for external NMI signals.
(bnc#888847)

- x86/uv/nmi: Fix Sparse warnings. (bnc#888847)

- x86: Add check for number of available vectors before
CPU down. (bnc#887418)

- x86: Lock down IO port access when module security is
enabled. (bnc#884333)

- x86: Restrict MSR access when module loading is
restricted. (bnc#884333)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=774818
https://bugzilla.novell.com/show_bug.cgi?id=806990
https://bugzilla.novell.com/show_bug.cgi?id=816708
https://bugzilla.novell.com/show_bug.cgi?id=826486
https://bugzilla.novell.com/show_bug.cgi?id=832309
https://bugzilla.novell.com/show_bug.cgi?id=849123
https://bugzilla.novell.com/show_bug.cgi?id=855657
https://bugzilla.novell.com/show_bug.cgi?id=859840
https://bugzilla.novell.com/show_bug.cgi?id=860441
https://bugzilla.novell.com/show_bug.cgi?id=860593
https://bugzilla.novell.com/show_bug.cgi?id=863586
https://bugzilla.novell.com/show_bug.cgi?id=866130
https://bugzilla.novell.com/show_bug.cgi?id=866615
https://bugzilla.novell.com/show_bug.cgi?id=866864
https://bugzilla.novell.com/show_bug.cgi?id=866911
https://bugzilla.novell.com/show_bug.cgi?id=869055
https://bugzilla.novell.com/show_bug.cgi?id=869934
https://bugzilla.novell.com/show_bug.cgi?id=870161
https://bugzilla.novell.com/show_bug.cgi?id=871797
https://bugzilla.novell.com/show_bug.cgi?id=876017
https://bugzilla.novell.com/show_bug.cgi?id=876055
https://bugzilla.novell.com/show_bug.cgi?id=876114
https://bugzilla.novell.com/show_bug.cgi?id=876590
https://bugzilla.novell.com/show_bug.cgi?id=879921
https://bugzilla.novell.com/show_bug.cgi?id=880344
https://bugzilla.novell.com/show_bug.cgi?id=880370
https://bugzilla.novell.com/show_bug.cgi?id=881051
https://bugzilla.novell.com/show_bug.cgi?id=881759
https://bugzilla.novell.com/show_bug.cgi?id=882317
https://bugzilla.novell.com/show_bug.cgi?id=882639
https://bugzilla.novell.com/show_bug.cgi?id=882804
https://bugzilla.novell.com/show_bug.cgi?id=882900
https://bugzilla.novell.com/show_bug.cgi?id=883376
https://bugzilla.novell.com/show_bug.cgi?id=883518
https://bugzilla.novell.com/show_bug.cgi?id=883724
https://bugzilla.novell.com/show_bug.cgi?id=884333
https://bugzilla.novell.com/show_bug.cgi?id=884582
https://bugzilla.novell.com/show_bug.cgi?id=884725
https://bugzilla.novell.com/show_bug.cgi?id=884767
https://bugzilla.novell.com/show_bug.cgi?id=885262
https://bugzilla.novell.com/show_bug.cgi?id=885382
https://bugzilla.novell.com/show_bug.cgi?id=885422
https://bugzilla.novell.com/show_bug.cgi?id=885509
https://bugzilla.novell.com/show_bug.cgi?id=886840
https://bugzilla.novell.com/show_bug.cgi?id=887082
https://bugzilla.novell.com/show_bug.cgi?id=887503
https://bugzilla.novell.com/show_bug.cgi?id=887608
https://bugzilla.novell.com/show_bug.cgi?id=887645
https://bugzilla.novell.com/show_bug.cgi?id=887680
https://bugzilla.novell.com/show_bug.cgi?id=888058
https://bugzilla.novell.com/show_bug.cgi?id=888105
https://bugzilla.novell.com/show_bug.cgi?id=888591
https://bugzilla.novell.com/show_bug.cgi?id=888607
https://bugzilla.novell.com/show_bug.cgi?id=888847
https://bugzilla.novell.com/show_bug.cgi?id=888849
https://bugzilla.novell.com/show_bug.cgi?id=888968
https://bugzilla.novell.com/show_bug.cgi?id=889061
https://bugzilla.novell.com/show_bug.cgi?id=889173
https://bugzilla.novell.com/show_bug.cgi?id=889451
https://bugzilla.novell.com/show_bug.cgi?id=889614
https://bugzilla.novell.com/show_bug.cgi?id=889727
https://bugzilla.novell.com/show_bug.cgi?id=890297
https://bugzilla.novell.com/show_bug.cgi?id=890426
https://bugzilla.novell.com/show_bug.cgi?id=890513
https://bugzilla.novell.com/show_bug.cgi?id=890526
https://bugzilla.novell.com/show_bug.cgi?id=891087
https://bugzilla.novell.com/show_bug.cgi?id=891259
https://bugzilla.novell.com/show_bug.cgi?id=891619
https://bugzilla.novell.com/show_bug.cgi?id=892200
https://bugzilla.novell.com/show_bug.cgi?id=892490
https://bugzilla.novell.com/show_bug.cgi?id=892723
https://bugzilla.novell.com/show_bug.cgi?id=893064
https://bugzilla.novell.com/show_bug.cgi?id=893496
https://bugzilla.novell.com/show_bug.cgi?id=893596
https://bugzilla.novell.com/show_bug.cgi?id=894200
http://support.novell.com/security/cve/CVE-2013-1979.html
http://support.novell.com/security/cve/CVE-2014-1739.html
http://support.novell.com/security/cve/CVE-2014-2706.html
http://support.novell.com/security/cve/CVE-2014-3153.html
http://support.novell.com/security/cve/CVE-2014-4027.html
http://support.novell.com/security/cve/CVE-2014-4171.html
http://support.novell.com/security/cve/CVE-2014-4508.html
http://support.novell.com/security/cve/CVE-2014-4667.html
http://support.novell.com/security/cve/CVE-2014-4943.html
http://support.novell.com/security/cve/CVE-2014-5077.html
http://support.novell.com/security/cve/CVE-2014-5471.html
http://support.novell.com/security/cve/CVE-2014-5472.html
http://support.novell.com/security/cve/CVE-2014-6410.html

Solution :

Apply SAT patch number 9750.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

SuSE 11.3 Security Update : Linux kernel (SAT Patch Numbers 9746 / 9749 / 9751)


Synopsis:

The remote SuSE 11 host is missing one or more security updates.

Description:

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to
fix various bugs and security issues.

The following security bugs have been fixed :

- The media_device_enum_entities function in
drivers/media/media-device.c in the Linux kernel before
3.14.6 does not initialize a certain data structure,
which allows local users to obtain sensitive information
from kernel memory by leveraging /dev/media0 read access
for a MEDIA_IOC_ENUM_ENTITIES ioctl call. (bnc#882804).
(CVE-2014-1739)

- mm/shmem.c in the Linux kernel through 3.15.1 does not
properly implement the interaction between range
notification and hole punching, which allows local users
to cause a denial of service (i_mutex hold) by using the
mmap system call to access a hole, as demonstrated by
interfering with intended shmem activity by blocking
completion of (1) an MADV_REMOVE madvise call or (2) an
FALLOC_FL_PUNCH_HOLE fallocate call. (bnc#883518).
(CVE-2014-4171)

- arch/x86/kernel/entry_32.S in the Linux kernel through
3.15.1 on 32-bit x86 platforms, when syscall auditing is
enabled and the sep CPU feature flag is set, allows
local users to cause a denial of service (OOPS and
system crash) via an invalid syscall number, as
demonstrated by number 1000. (bnc#883724).
(CVE-2014-4508)

- The sctp_association_free function in
net/sctp/associola.c in the Linux kernel before 3.15.2
does not properly manage a certain backlog value, which
allows remote attackers to cause a denial of service
(socket outage) via a crafted SCTP packet. (bnc#885422).
(CVE-2014-4667)

- The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux
kernel through 3.15.6 allows local users to gain
privileges by leveraging data-structure differences
between an l2tp socket and an inet socket. (bnc#887082).
(CVE-2014-4943)

- The sctp_assoc_update function in net/sctp/associola.c
in the Linux kernel through 3.15.8, when SCTP
authentication is enabled, allows remote attackers to
cause a denial of service (NULL pointer dereference and
OOPS) by starting to establish an association between
two endpoints immediately after an exchange of INIT and
INIT ACK chunks to establish an earlier association
between these endpoints in the opposite direction.
(bnc#889173). (CVE-2014-5077)

- Stack consumption vulnerability in the
parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel through 3.16.1
allows local users to cause a denial of service
(uncontrolled recursion, and system crash or reboot) via
a crafted iso9660 image with a CL entry referring to a
directory entry that has a CL entry. (bnc#892490).
(CVE-2014-5471)

- The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel through 3.16.1
allows local users to cause a denial of service
(unkillable mount process) via a crafted iso9660 image
with a self-referential CL entry. (bnc#892490).
(CVE-2014-5472)

- Race condition in the mac80211 subsystem in the Linux
kernel before 3.13.7 allows remote attackers to cause a
denial of service (system crash) via network traffic
that improperly interacts with the WLAN_STA_PS_STA state
(aka power-save mode), related to sta_info.c and tx.c.
(bnc#871797). (CVE-2014-2706)

- The rd_build_device_space function in
drivers/target/target_core_rd.c in the Linux kernel
before 3.14 does not properly initialize a certain data
structure, which allows local users to obtain sensitive
information from ramdisk_mcp memory by leveraging access
to a SCSI initiator. (bnc#882639). (CVE-2014-4027)

- The futex_requeue function in kernel/futex.c in the
Linux kernel through 3.14.5 does not ensure that calls
have two different futex addresses, which allows local
users to gain privileges via a crafted FUTEX_REQUEUE
command that facilitates unsafe waiter modification.
(bnc#880892). (CVE-2014-3153)

- Avoid infinite loop when processing indirect ICBs
(bnc#896689) The following non-security bugs have been
fixed:. (CVE-2014-6410)

- ACPI / PAD: call schedule() when need_resched() is true.
(bnc#866911)

- ACPI: Fix bug when ACPI reset register is implemented in
system memory. (bnc#882900)

- ACPI: Limit access to custom_method. (bnc#884333)

- ALSA: hda - Enabling Realtek ALC 671 codec. (bnc#891746)

- Add option to automatically enforce module signatures
when in Secure Boot mode. (bnc#884333)

- Add secure_modules() call. (bnc#884333)

- Add wait_on_atomic_t() and wake_up_atomic_t().
(bnc#880344)

- Backported new patches of Lock down functions for UEFI
secure boot Also updated series.conf and removed old
patches.

- Btrfs: Return EXDEV for cross file system snapshot.

- Btrfs: abort the transaction when we does not find our
extent ref.

- Btrfs: avoid warning bomb of btrfs_invalidate_inodes.

- Btrfs: cancel scrub on transaction abortion.

- Btrfs: correctly set profile flags on seqlock retry.

- Btrfs: does not check nodes for extent items.

- Btrfs: fix a possible deadlock between scrub and
transaction committing.

- Btrfs: fix corruption after write/fsync failure + fsync
+ log recovery. (bnc#894200)

- Btrfs: fix csum tree corruption, duplicate and outdated
checksums. (bnc#891619)

- Btrfs: fix double free in find_lock_delalloc_range.

- Btrfs: fix possible memory leak in btrfs_create_tree().

- Btrfs: fix use of uninit 'ret' in
end_extent_writepage().

- Btrfs: free delayed node outside of root->inode_lock.
(bnc#866864)

- Btrfs: make DEV_INFO ioctl available to anyone.

- Btrfs: make FS_INFO ioctl available to anyone.

- Btrfs: make device scan less noisy.

- Btrfs: make sure there are not any read requests before
stopping workers.

- Btrfs: more efficient io tree navigation on
wait_extent_bit.

- Btrfs: output warning instead of error when loading free
space cache failed.

- Btrfs: retrieve more info from FS_INFO ioctl.

- Btrfs: return EPERM when deleting a default subvolume.
(bnc#869934)

- Btrfs: unset DCACHE_DISCONNECTED when mounting default
subvol. (bnc#866615)

- Btrfs: use right type to get real comparison.

- Btrfs: wake up @scrub_pause_wait as much as we can.

- Btrfs: wake up transaction thread upon remount.

- CacheFiles: Add missing retrieval completions.
(bnc#880344)

- CacheFiles: Does not try to dump the index key if the
cookie has been cleared. (bnc#880344)

- CacheFiles: Downgrade the requirements passed to the
allocator. (bnc#880344)

- CacheFiles: Fix the marking of cached pages.
(bnc#880344)

- CacheFiles: Implement invalidation. (bnc#880344)

- CacheFiles: Make some debugging statements conditional.
(bnc#880344)

- Drivers: hv: util: Fix a bug in the KVP code.
(bnc#886840)

- Drivers: hv: vmbus: Fix a bug in the channel callback
dispatch code. (bnc#886840)

- FS-Cache: Add transition to handle invalidate
immediately after lookup. (bnc#880344)

- FS-Cache: Check that there are no read ops when cookie
relinquished. (bnc#880344)

- FS-Cache: Clear remaining page count on retrieval
cancellation. (bnc#880344)

- FS-Cache: Convert the object event ID #defines into an
enum. (bnc#880344)

- FS-Cache: Does not sleep in page release if __GFP_FS is
not set. (bnc#880344)

- FS-Cache: Does not use spin_is_locked() in assertions.
(bnc#880344)

- FS-Cache: Exclusive op submission can BUG if there is
been an I/O error. (bnc#880344)

- FS-Cache: Fix __wait_on_atomic_t() to call the action
func if the counter != 0. (bnc#880344)

- FS-Cache: Fix object state machine to have separate work
and wait states. (bnc#880344)

- FS-Cache: Fix operation state management and accounting.
(bnc#880344)

- FS-Cache: Fix signal handling during waits. (bnc#880344)

- FS-Cache: Initialise the object event mask with the
calculated mask. (bnc#880344)

- FS-Cache: Limit the number of I/O error reports for a
cache. (bnc#880344)

- FS-Cache: Make cookie relinquishment wait for
outstanding reads. (bnc#880344)

- FS-Cache: Mark cancellation of in-progress operation.
(bnc#880344)

- FS-Cache: One of the write operation paths doeses not
set the object state. (bnc#880344)

- FS-Cache: Provide proper invalidation. (bnc#880344)

- FS-Cache: Simplify cookie retention for fscache_objects,
fixing oops. (bnc#880344)

- FS-Cache: The retrieval remaining-pages counter needs to
be atomic_t. (bnc#880344)

- FS-Cache: Uninline fscache_object_init(). (bnc#880344)

- FS-Cache: Wrap checks on object state. (bnc#880344)

- HID: usbhid: add always-poll quirk. (bnc#888607)

- HID: usbhid: enable always-poll quirk for Elan
Touchscreen. (bnc#888607)

- IB/iser: Add TIMEWAIT_EXIT event handling. (bnc#890297)

- Ignore 'flags' change to event_constraint. (bnc#876114)

- Ignore data_src/weight changes to perf_sample_data.
(bnc#876114)

- NFS: Allow more operations in an NFSv4.1 request.
(bnc#890513)

- NFS: Clean up helper function nfs4_select_rw_stateid().
(bnc#888968)

- NFS: Does not copy read delegation stateids in setattr.
(bnc#888968)

- NFS: Does not use a delegation to open a file when
returning that delegation. (bnc#888968, bnc#892200,
bnc#893596, bnc#893496)

- NFS: Fixes for NFS RCU-walk support in line with code
going upstream

- NFS: Use FS-Cache invalidation. (bnc#880344)

- NFS: allow lockless access to access_cache. (bnc#866130)

- NFS: avoid mountpoint being displayed as ' (deleted)' in
/proc/mounts. (bnc#888591)

- NFS: nfs4_do_open should add negative results to the
dcache. (bnc#866130)

- NFS: nfs_migrate_page() does not wait for FS-Cache to
finish with a page. (bnc#880344)

- NFS: nfs_open_revalidate: only evaluate parent if it
will be used. (bnc#866130)

- NFS: prepare for RCU-walk support but pushing tests
later in code. (bnc#866130)

- NFS: support RCU_WALK in nfs_permission(). (bnc#866130)

- NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU.
(bnc#866130)

- NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU.
(bnc#866130)

- NFSD: Does not hand out delegations for 30 seconds after
recalling them. (bnc#880370)

- NFSv4 set open access operation call flag in
nfs4_init_opendata_res. (bnc#888968, bnc#892200,
bnc#893596, bnc#893496)

- NFSv4: Add a helper for encoding opaque data.
(bnc#888968)

- NFSv4: Add a helper for encoding stateids. (bnc#888968)

- NFSv4: Add helpers for basic copying of stateids.
(bnc#888968)

- NFSv4: Clean up nfs4_select_rw_stateid(). (bnc#888968)

- NFSv4: Fix the return value of nfs4_select_rw_stateid.
(bnc#888968)

- NFSv4: Rename nfs4_copy_stateid(). (bnc#888968)

- NFSv4: Resend the READ/WRITE RPC call if a stateid
change causes an error. (bnc#888968)

- NFSv4: Simplify the struct nfs4_stateid. (bnc#888968)

- NFSv4: The stateid must remain the same for replayed RPC
calls. (bnc#888968)

- NFSv4: nfs4_stateid_is_current should return 'true' for
an invalid stateid. (bnc#888968)

- One more fix for kABI breakage.

- PCI: Lock down BAR access when module security is
enabled. (bnc#884333)

- PCI: enable MPS 'performance' setting to properly handle
bridge MPS. (bnc#883376)

- PM / Hibernate: Add memory_rtree_find_bit function.
(bnc#860441)

- PM / Hibernate: Create a Radix-Tree to store memory
bitmap. (bnc#860441)

- PM / Hibernate: Implement position keeping in radix
tree. (bnc#860441)

- PM / Hibernate: Iterate over set bits instead of PFNs in
swsusp_free(). (bnc#860441)

- PM / Hibernate: Remove the old memory-bitmap
implementation. (bnc#860441)

- PM / Hibernate: Touch Soft Lockup Watchdog in
rtree_next_node. (bnc#860441)

- Restrict /dev/mem and /dev/kmem when module loading is
restricted. (bnc#884333)

- Reuse existing 'state' field to indicate
PERF_X86_EVENT_PEBS_LDLAT. (bnc#876114)

- USB: handle LPM errors during device suspend correctly.
(bnc#849123)

- Update kabi files to reflect fscache change.
(bnc#880344)

- Update x86_64 config files: re-enable SENSORS_W83627EHF.
(bnc#891281)

- VFS: Make more complete truncate operation available to
CacheFiles. (bnc#880344)

- [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger
(FATE#83366, ltc#83367).

- acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted. (bnc#884333)

- af_iucv: correct cleanup if listen backlog is full
(bnc#885262, LTC#111728).

- asus-wmi: Restrict debugfs interface when module loading
is restricted. (bnc#884333)

- autofs4: allow RCU-walk to walk through autofs4.
(bnc#866130)

- autofs4: avoid taking fs_lock during rcu-walk.
(bnc#866130)

- autofs4: does not take spinlock when not needed in
autofs4_lookup_expiring. (bnc#866130)

- autofs4: factor should_expire() out of
autofs4_expire_indirect. (bnc#866130)

- autofs4: make 'autofs4_can_expire' idempotent.
(bnc#866130)

- autofs4: remove a redundant assignment. (bnc#866130)

- autofs: fix lockref lookup. (bnc#888591)

- be2net: add dma_mapping_error() check for
dma_map_page(). (bnc#881759)

- block: add cond_resched() to potentially long running
ioctl discard loop. (bnc#884725)

- block: fix race between request completion and timeout
handling. (bnc#881051)

- cdc-ether: clean packet filter upon probe. (bnc#876017)

- cpuset: Fix memory allocator deadlock. (bnc#876590)

- crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not
all archs have them, but some are FIPS certified, with
some kernel support.

- crypto: fips - only panic on bad/missing crypto mod
signatures. (bnc#887503)

- crypto: testmgr - allow aesni-intel and
ghash_clmulni-intel in fips mode. (bnc#889451)

- dasd: validate request size before building CCW/TCW
(bnc#891087, LTC#114068).

- dm mpath: fix race condition between multipath_dtr and
pg_init_done. (bnc#826486)

- dm-mpath: fix panic on deleting sg device. (bnc#870161)

- drm/ast: AST2000 cannot be detected correctly.
(bnc#895983)

- drm/ast: Actually load DP501 firmware when required.
(bnc#895608 / bnc#871134)

- drm/ast: Add missing entry to dclk_table[].

- drm/ast: Add reduced non reduced mode parsing for wide
screen mode. (bnc#892723)

- drm/ast: initial DP501 support (v0.2). (bnc#871134)

- drm/ast: open key before detect chips. (bnc#895983)

- drm/i915: Fix up cpt pixel multiplier enable sequence.
(bnc#879304)

- drm/i915: Only apply DPMS to the encoder if enabled.
(bnc#893064)

- drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver
init. (bnc#869055)

- drm/i915: create functions for the 'unclaimed register'
checks. (bnc#869055)

- drm/i915: use FPGA_DBG for the 'unclaimed register'
checks. (bnc#869055)

- drm/mgag200: Initialize data needed to map fbdev memory.
(bnc#806990)

- e1000e: enable support for new device IDs. (bnc#885509)

- fs/fscache: remove spin_lock() from the condition in
while(). (bnc#880344)

- hibernate: Disable in a signed modules environment.
(bnc#884333)

- hugetlb: does not use ERR_PTR with VM_FAULT* values

- ibmvscsi: Abort init sequence during error recovery.
(bnc#885382)

- ibmvscsi: Add memory barriers for send / receive.
(bnc#885382)

- inet: add a redirect generation id in inetpeer.
(bnc#860593)

- inetpeer: initialize ->redirect_genid in inet_getpeer().
(bnc#860593)

- ipv6: tcp: fix tcp_v6_conn_request(). (bnc#887645)

- kabi: hide bnc#860593 changes of struct
inetpeer_addr_base. (bnc#860593)

- kernel: 3215 tty hang (bnc#891087, LTC#114562).

- kernel: fix data corruption when reading /proc/sysinfo
(bnc#891087, LTC#114480).

- kernel: fix kernel oops with load of fpc register
(bnc#889061, LTC#113596).

- kernel: sclp console tty reference counting (bnc#891087,
LTC#115466).

- kexec: Disable at runtime if the kernel enforces module
loading restrictions. (bnc#884333)

- md/raid6: avoid data corruption during recovery of
double-degraded RAID6.

- memcg, vmscan: Fix forced scan of anonymous pages
(memory reclaim fix).

- memcg: do not expose uninitialized mem_cgroup_per_node
to world. (bnc#883096)

- mm, hugetlb: add VM_NORESERVE check in
vma_has_reserves()

- mm, hugetlb: change variable name reservations to resv

- mm, hugetlb: decrement reserve count if VM_NORESERVE
alloc page cache

- mm, hugetlb: defer freeing pages when gathering surplus
pages

- mm, hugetlb: do not use a page in page cache for cow
optimization

- mm, hugetlb: fix and clean-up node iteration code to
alloc or free

- mm, hugetlb: fix race in region tracking

- mm, hugetlb: fix subpool accounting handling

- mm, hugetlb: improve page-fault scalability

- mm, hugetlb: improve, cleanup resv_map parameters

- mm, hugetlb: move up the code which check availability
of free huge page

- mm, hugetlb: protect reserved pages when soft offlining
a hugepage

- mm, hugetlb: remove decrement_hugepage_resv_vma()

- mm, hugetlb: remove redundant list_empty check in
gather_surplus_pages()

- mm, hugetlb: remove resv_map_put

- mm, hugetlb: remove useless check about mapping type

- mm, hugetlb: return a reserved page to a reserved pool
if failed

- mm, hugetlb: trivial commenting fix

- mm, hugetlb: unify region structure handling

- mm, hugetlb: unify region structure handling kabi

- mm, hugetlb: use long vars instead of int in
region_count() (Hugetlb Fault Scalability).

- mm, hugetlb: use vma_resv_map() map types

- mm, oom: fix badness score underflow. (bnc#884582,
bnc#884767)

- mm, oom: normalize oom scores to oom_score_adj scale
only for userspace. (bnc#884582, bnc#884767)

- mm, thp: do not allow thp faults to avoid cpuset
restrictions. (bnc#888849)

- net/mlx4_core: Load higher level modules according to
ports type. (bnc#887680)

- net/mlx4_core: Load the IB driver when the device
supports IBoE. (bnc#887680)

- net/mlx4_en: Fix a race between napi poll function and
RX ring cleanup. (bnc#863586)

- net/mlx4_en: Fix selftest failing on non 10G link speed.
(bnc#888058)

- net: fix checksumming features handling in output path.
(bnc#891259)

- pagecache_limit: batch large nr_to_scan targets.
(bnc#895221)

- pagecachelimit: reduce lru_lock congestion for heavy
parallel reclaim fix. (bnc#895680)

- perf/core: Add weighted samples. (bnc#876114)

- perf/x86: Add flags to event constraints. (bnc#876114)

- perf/x86: Add memory profiling via PEBS Load Latency.
(bnc#876114)

- perf: Add generic memory sampling interface.
(bnc#876114)

- qla2xxx: Avoid escalating the SCSI error handler if the
command is not found in firmware. (bnc#859840)

- qla2xxx: Clear loop_id for ports that are marked lost
during fabric scanning. (bnc#859840)

- qla2xxx: Does not check for firmware hung during the
reset context for ISP82XX. (bnc#859840)

- qla2xxx: Issue abort command for outstanding commands
during cleanup when only firmware is alive. (bnc#859840)

- qla2xxx: Reduce the time we wait for a command to
complete during SCSI error handling. (bnc#859840)

- qla2xxx: Set host can_queue value based on available
resources. (bnc#859840)

- restore smp_mb() in unlock_new_inode(). (bnc#890526)

- s390/pci: introduce lazy IOTLB flushing for DMA unmap
(bnc#889061, LTC#113725).

- sched: fix the theoretical signal_wake_up() vs
schedule() race. (bnc#876055)

- sclp_vt220: Enable integrated ASCII console per default
(bnc#885262, LTC#112035).

- scsi_dh: use missing accessor 'scsi_device_from_queue'.
(bnc#889614)

- scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail.
(bnc#887608)

- scsiback: correct grant page unmapping.

- scsiback: fix retry handling in __report_luns().

- scsiback: free resources after error.

- sunrpc/auth: allow lockless (rcu) lookup of credential
cache. (bnc#866130)

- supported.conf: remove external from drivers/net/veth.
(bnc#889727)

- supported.conf: support net/sched/act_police.ko.
(bnc#890426)

- tcp: adapt selected parts of RFC 5682 and PRR logic.
(bnc#879921)

- tg3: Change nvram command timeout value to 50ms.
(bnc#855657)

- tg3: Override clock, link aware and link idle mode
during NVRAM dump. (bnc#855657)

- tg3: Set the MAC clock to the fastest speed during boot
code load. (bnc#855657)

- usb: Does not enable LPM if the exit latency is zero.
(bnc#832309)

- usbcore: Does not log on consecutive debounce failures
of the same port. (bnc#888105)

- usbhid: fix PIXART optical mouse. (bnc#888607)

- uswsusp: Disable when module loading is restricted.
(bnc#884333)

- vscsi: support larger transfer sizes. (bnc#774818)

- writeback: Do not sync data dirtied after sync start.
(bnc#833820)

- x86 thermal: Delete power-limit-notification console
messages. (bnc#882317)

- x86 thermal: Disable power limit notification interrupt
by default. (bnc#882317)

- x86 thermal: Re-enable power limit notification
interrupt by default. (bnc#882317)

- x86, cpu hotplug: Fix stack frame warning in
check_irq_vectors_for_cpu_disable(). (bnc#887418)

- x86/UV: Add call to KGDB/KDB from NMI handler.
(bnc#888847)

- x86/UV: Add kdump to UV NMI handler. (bnc#888847)

- x86/UV: Add summary of cpu activity to UV NMI handler.
(bnc#888847)

- x86/UV: Move NMI support. (bnc#888847)

- x86/UV: Update UV support for external NMI signals.
(bnc#888847)

- x86/uv/nmi: Fix Sparse warnings. (bnc#888847)

- x86: Add check for number of available vectors before
CPU down. (bnc#887418)

- x86: Lock down IO port access when module security is
enabled. (bnc#884333)

- x86: Restrict MSR access when module loading is
restricted. (bnc#884333)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=774818
https://bugzilla.novell.com/show_bug.cgi?id=806990
https://bugzilla.novell.com/show_bug.cgi?id=816708
https://bugzilla.novell.com/show_bug.cgi?id=826486
https://bugzilla.novell.com/show_bug.cgi?id=832309
https://bugzilla.novell.com/show_bug.cgi?id=833820
https://bugzilla.novell.com/show_bug.cgi?id=849123
https://bugzilla.novell.com/show_bug.cgi?id=855657
https://bugzilla.novell.com/show_bug.cgi?id=859840
https://bugzilla.novell.com/show_bug.cgi?id=860441
https://bugzilla.novell.com/show_bug.cgi?id=860593
https://bugzilla.novell.com/show_bug.cgi?id=863586
https://bugzilla.novell.com/show_bug.cgi?id=866130
https://bugzilla.novell.com/show_bug.cgi?id=866615
https://bugzilla.novell.com/show_bug.cgi?id=866864
https://bugzilla.novell.com/show_bug.cgi?id=866911
https://bugzilla.novell.com/show_bug.cgi?id=869055
https://bugzilla.novell.com/show_bug.cgi?id=869934
https://bugzilla.novell.com/show_bug.cgi?id=870161
https://bugzilla.novell.com/show_bug.cgi?id=871134
https://bugzilla.novell.com/show_bug.cgi?id=871797
https://bugzilla.novell.com/show_bug.cgi?id=876017
https://bugzilla.novell.com/show_bug.cgi?id=876055
https://bugzilla.novell.com/show_bug.cgi?id=876114
https://bugzilla.novell.com/show_bug.cgi?id=876590
https://bugzilla.novell.com/show_bug.cgi?id=879304
https://bugzilla.novell.com/show_bug.cgi?id=879921
https://bugzilla.novell.com/show_bug.cgi?id=880344
https://bugzilla.novell.com/show_bug.cgi?id=880370
https://bugzilla.novell.com/show_bug.cgi?id=880892
https://bugzilla.novell.com/show_bug.cgi?id=881051
https://bugzilla.novell.com/show_bug.cgi?id=881759
https://bugzilla.novell.com/show_bug.cgi?id=882317
https://bugzilla.novell.com/show_bug.cgi?id=882639
https://bugzilla.novell.com/show_bug.cgi?id=882804
https://bugzilla.novell.com/show_bug.cgi?id=882900
https://bugzilla.novell.com/show_bug.cgi?id=883096
https://bugzilla.novell.com/show_bug.cgi?id=883376
https://bugzilla.novell.com/show_bug.cgi?id=883518
https://bugzilla.novell.com/show_bug.cgi?id=883724
https://bugzilla.novell.com/show_bug.cgi?id=884333
https://bugzilla.novell.com/show_bug.cgi?id=884582
https://bugzilla.novell.com/show_bug.cgi?id=884725
https://bugzilla.novell.com/show_bug.cgi?id=884767
https://bugzilla.novell.com/show_bug.cgi?id=885262
https://bugzilla.novell.com/show_bug.cgi?id=885382
https://bugzilla.novell.com/show_bug.cgi?id=885422
https://bugzilla.novell.com/show_bug.cgi?id=885509
https://bugzilla.novell.com/show_bug.cgi?id=886840
https://bugzilla.novell.com/show_bug.cgi?id=887082
https://bugzilla.novell.com/show_bug.cgi?id=887418
https://bugzilla.novell.com/show_bug.cgi?id=887503
https://bugzilla.novell.com/show_bug.cgi?id=887608
https://bugzilla.novell.com/show_bug.cgi?id=887645
https://bugzilla.novell.com/show_bug.cgi?id=887680
https://bugzilla.novell.com/show_bug.cgi?id=888058
https://bugzilla.novell.com/show_bug.cgi?id=888105
https://bugzilla.novell.com/show_bug.cgi?id=888591
https://bugzilla.novell.com/show_bug.cgi?id=888607
https://bugzilla.novell.com/show_bug.cgi?id=888847
https://bugzilla.novell.com/show_bug.cgi?id=888849
https://bugzilla.novell.com/show_bug.cgi?id=888968
https://bugzilla.novell.com/show_bug.cgi?id=889061
https://bugzilla.novell.com/show_bug.cgi?id=889173
https://bugzilla.novell.com/show_bug.cgi?id=889451
https://bugzilla.novell.com/show_bug.cgi?id=889614
https://bugzilla.novell.com/show_bug.cgi?id=889727
https://bugzilla.novell.com/show_bug.cgi?id=890297
https://bugzilla.novell.com/show_bug.cgi?id=890426
https://bugzilla.novell.com/show_bug.cgi?id=890513
https://bugzilla.novell.com/show_bug.cgi?id=890526
https://bugzilla.novell.com/show_bug.cgi?id=891087
https://bugzilla.novell.com/show_bug.cgi?id=891259
https://bugzilla.novell.com/show_bug.cgi?id=891281
https://bugzilla.novell.com/show_bug.cgi?id=891619
https://bugzilla.novell.com/show_bug.cgi?id=891746
https://bugzilla.novell.com/show_bug.cgi?id=892200
https://bugzilla.novell.com/show_bug.cgi?id=892490
https://bugzilla.novell.com/show_bug.cgi?id=892723
https://bugzilla.novell.com/show_bug.cgi?id=893064
https://bugzilla.novell.com/show_bug.cgi?id=893496
https://bugzilla.novell.com/show_bug.cgi?id=893596
https://bugzilla.novell.com/show_bug.cgi?id=894200
https://bugzilla.novell.com/show_bug.cgi?id=895221
https://bugzilla.novell.com/show_bug.cgi?id=895608
https://bugzilla.novell.com/show_bug.cgi?id=895680
https://bugzilla.novell.com/show_bug.cgi?id=895983
https://bugzilla.novell.com/show_bug.cgi?id=896689
http://support.novell.com/security/cve/CVE-2013-1979.html
http://support.novell.com/security/cve/CVE-2014-1739.html
http://support.novell.com/security/cve/CVE-2014-2706.html
http://support.novell.com/security/cve/CVE-2014-3153.html
http://support.novell.com/security/cve/CVE-2014-4027.html
http://support.novell.com/security/cve/CVE-2014-4171.html
http://support.novell.com/security/cve/CVE-2014-4508.html
http://support.novell.com/security/cve/CVE-2014-4667.html
http://support.novell.com/security/cve/CVE-2014-4943.html
http://support.novell.com/security/cve/CVE-2014-5077.html
http://support.novell.com/security/cve/CVE-2014-5471.html
http://support.novell.com/security/cve/CVE-2014-5472.html
http://support.novell.com/security/cve/CVE-2014-6410.html

Solution :

Apply SAT patch number 9746 / 9749 / 9751 as appropriate.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Scientific Linux Security Update : wireshark on SL6.x, SL7.x i386/x86_64


Synopsis:

The remote Scientific Linux host is missing one or more security
updates.

Description:

Multiple flaws were found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash
or, possibly, execute arbitrary code as the user running Wireshark.
(CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432)

Several denial of service flaws were found in Wireshark. Wireshark
could crash or stop responding if it read a malformed packet off a
network, or opened a malicious dump file. (CVE-2014-6421,
CVE-2014-6422, CVE-2014-6423, CVE-2014-6424, CVE-2014-6425,
CVE-2014-6426, CVE-2014-6427, CVE-2014-6428)

All running instances of Wireshark must be restarted for the update to
take effect.

See also :

http://www.nessus.org/u?c25f1b2b

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Scientific Linux Security Update : wireshark on SL5.x i386/x86_64


Synopsis:

The remote Scientific Linux host is missing one or more security
updates.

Description:

Multiple flaws were found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash
or, possibly, execute arbitrary code as the user running Wireshark.
(CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432)

Several denial of service flaws were found in Wireshark. Wireshark
could crash or stop responding if it read a malformed packet off a
network, or opened a malicious dump file. (CVE-2014-6421,
CVE-2014-6422, CVE-2014-6423, CVE-2014-6425, CVE-2014-6428)

All running instances of Wireshark must be restarted for the update to
take effect.

See also :

http://www.nessus.org/u?23c39cde

Solution :

Update the affected wireshark, wireshark-debuginfo and / or
wireshark-gnome packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Scientific Linux Security Update : rsyslog5 and rsyslog on SL5.x, SL6.x i386/x86_64


Synopsis:

The remote Scientific Linux host is missing one or more security
updates.

Description:

A flaw was found in the way rsyslog handled invalid log message
priority values. In certain configurations, a local attacker, or a
remote attacker able to connect to the rsyslog port, could use this
flaw to crash the rsyslog daemon. (CVE-2014-3634)

After installing the update, the rsyslog service will be restarted
automatically.

See also :

http://www.nessus.org/u?ca364eea

Solution :

Update the affected packages.

Risk factor :

High

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Scientific Linux Security Update : libxml2 on SL6.x, SL7.x i386/x86_64


Synopsis:

The remote Scientific Linux host is missing one or more security
updates.

Description:

A denial of service flaw was found in libxml2, a library providing
support to read, modify and write XML and HTML files. A remote
attacker could provide a specially crafted XML file that, when
processed by an application using libxml2, would lead to excessive CPU
consumption (denial of service) based on excessive entity
substitutions, even if entity substitution was disabled, which is the
parser default behavior. (CVE-2014-3660)

The desktop must be restarted (log out, then log back in) for this
update to take effect.

See also :

http://www.nessus.org/u?521fba5d

Solution :

Update the affected packages.

Risk factor :

High

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Scientific Linux Security Update : java-1.7.0-openjdk on SL6.x, SL7.x i386/x86_64


Synopsis:

The remote Scientific Linux host is missing one or more security
updates.

Description:

Multiple flaws were discovered in the Libraries, 2D, and Hotspot
components in OpenJDK. An untrusted Java application or applet could
use these flaws to bypass certain Java sandbox restrictions.
(CVE-2014-6506, CVE-2014-6531, CVE-2014-6502, CVE-2014-6511,
CVE-2014-6504, CVE-2014-6519)

It was discovered that the StAX XML parser in the JAXP component in
OpenJDK performed expansion of external parameter entities even when
external entity substitution was disabled. A remote attacker could use
this flaw to perform XML eXternal Entity (XXE) attack against
applications using the StAX parser to parse untrusted XML documents.
(CVE-2014-6517)

It was discovered that the DatagramSocket implementation in OpenJDK
failed to perform source address checks for packets received on a
connected socket. A remote attacker could use this flaw to have their
packets processed as if they were received from the expected source.
(CVE-2014-6512)

It was discovered that the TLS/SSL implementation in the JSSE
component in OpenJDK failed to properly verify the server identity
during the renegotiation following session resumption, making it
possible for malicious TLS/SSL servers to perform a Triple Handshake
attack against clients using JSSE and client certificate
authentication. (CVE-2014-6457)

It was discovered that the CipherInputStream class implementation in
OpenJDK did not properly handle certain exceptions. This could
possibly allow an attacker to affect the integrity of an encrypted
stream handled by this class. (CVE-2014-6558)

Note: If the web browser plug-in provided by the icedtea-web package
was installed, the issues exposed via Java applets could have been
exploited without user interaction if a user visited a malicious
website.

This update also fixes the following bug :

- The TLS/SSL implementation in OpenJDK previously failed
to handle Diffie-Hellman (DH) keys with more than 1024
bits. This caused client applications using JSSE to fail
to establish TLS/SSL connections to servers using larger
DH keys during the connection handshake. This update
adds support for DH keys with size up to 2048 bits.

All running instances of OpenJDK Java must be restarted for the update
to take effect.

See also :

http://www.nessus.org/u?f291ae86

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Scientific Linux Security Update : java-1.7.0-openjdk on SL5.x i386/x86_64


Synopsis:

The remote Scientific Linux host is missing one or more security
updates.

Description:

Multiple flaws were discovered in the Libraries, 2D, and Hotspot
components in OpenJDK. An untrusted Java application or applet could
use these flaws to bypass certain Java sandbox restrictions.
(CVE-2014-6506, CVE-2014-6531, CVE-2014-6502, CVE-2014-6511,
CVE-2014-6504, CVE-2014-6519)

It was discovered that the StAX XML parser in the JAXP component in
OpenJDK performed expansion of external parameter entities even when
external entity substitution was disabled. A remote attacker could use
this flaw to perform XML eXternal Entity (XXE) attack against
applications using the StAX parser to parse untrusted XML documents.
(CVE-2014-6517)

It was discovered that the DatagramSocket implementation in OpenJDK
failed to perform source address checks for packets received on a
connected socket. A remote attacker could use this flaw to have their
packets processed as if they were received from the expected source.
(CVE-2014-6512)

It was discovered that the TLS/SSL implementation in the JSSE
component in OpenJDK failed to properly verify the server identity
during the renegotiation following session resumption, making it
possible for malicious TLS/SSL servers to perform a Triple Handshake
attack against clients using JSSE and client certificate
authentication. (CVE-2014-6457)

It was discovered that the CipherInputStream class implementation in
OpenJDK did not properly handle certain exceptions. This could
possibly allow an attacker to affect the integrity of an encrypted
stream handled by this class. (CVE-2014-6558)

This update also fixes the following bug :

- The TLS/SSL implementation in OpenJDK previously failed
to handle Diffie-Hellman (DH) keys with more than 1024
bits. This caused client applications using JSSE to fail
to establish TLS/SSL connections to servers using larger
DH keys during the connection handshake. This update
adds support for DH keys with size up to 2048 bits.

All running instances of OpenJDK Java must be restarted for the update
to take effect.

See also :

http://www.nessus.org/u?1469e3ea

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Scientific Linux Security Update : java-1.6.0-openjdk on SL5.x, SL6.x, SL7.x i386/x86_64


Synopsis:

The remote Scientific Linux host is missing one or more security
updates.

Description:

Multiple flaws were discovered in the Libraries, 2D, and Hotspot
components in OpenJDK. An untrusted Java application or applet could
use these flaws to bypass certain Java sandbox restrictions.
(CVE-2014-6506, CVE-2014-6531, CVE-2014-6502, CVE-2014-6511,
CVE-2014-6504, CVE-2014-6519)

It was discovered that the StAX XML parser in the JAXP component in
OpenJDK performed expansion of external parameter entities even when
external entity substitution was disabled. A remote attacker could use
this flaw to perform XML eXternal Entity (XXE) attack against
applications using the StAX parser to parse untrusted XML documents.
(CVE-2014-6517)

It was discovered that the DatagramSocket implementation in OpenJDK
failed to perform source address checks for packets received on a
connected socket. A remote attacker could use this flaw to have their
packets processed as if they were received from the expected source.
(CVE-2014-6512)

It was discovered that the TLS/SSL implementation in the JSSE
component in OpenJDK failed to properly verify the server identity
during the renegotiation following session resumption, making it
possible for malicious TLS/SSL servers to perform a Triple Handshake
attack against clients using JSSE and client certificate
authentication. (CVE-2014-6457)

It was discovered that the CipherInputStream class implementation in
OpenJDK did not properly handle certain exceptions. This could
possibly allow an attacker to affect the integrity of an encrypted
stream handled by this class. (CVE-2014-6558)

This update also fixes the following bug :

- The TLS/SSL implementation in OpenJDK previously failed
to handle Diffie-Hellman (DH) keys with more than 1024
bits. This caused client applications using JSSE to fail
to establish TLS/SSL connections to servers using larger
DH keys during the connection handshake. This update
adds support for DH keys with size up to 2048 bits.

All running instances of OpenJDK Java must be restarted for the update
to take effect.

See also :

http://www.nessus.org/u?33afe81d

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Scientific Linux Security Update : trousers on SL6.x i386/x86_64


Synopsis:

The remote Scientific Linux host is missing one or more security
updates.

Description:

A flaw was found in the way tcsd, the daemon that manages Trusted
Computing resources, processed incoming TCP packets. A remote attacker
could send a specially crafted TCP packet that, when processed by
tcsd, could cause the daemon to crash. Note that by default tcsd
accepts requests on localhost only. (CVE-2012-0698)

The trousers package has been upgraded to upstream version 0.3.13,
which provides a number of bug fixes and enhancements over the
previous version, including corrected internal symbol names to avoid
collisions with other applications, fixed memory leaks, added IPv6
support, fixed buffer handling in tcsd, as well as changed the license
to BSD.

See also :

http://www.nessus.org/u?d2e00530

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Scientific Linux Security Update : openssh on SL6.x i386/x86_64


Synopsis:

The remote Scientific Linux host is missing one or more security
updates.

Description:

It was discovered that OpenSSH clients did not correctly verify DNS
SSHFP records. A malicious server could use this flaw to force a
connecting client to skip the DNS SSHFP record check and require the
user to perform manual host verification of the DNS SSHFP record.
(CVE-2014-2653)

It was found that OpenSSH did not properly handle certain AcceptEnv
parameter values with wildcard characters. A remote attacker could use
this flaw to bypass intended environment variable restrictions.
(CVE-2014-2532)

This update also fixes the following bugs :

- Based on the SP800-131A information security standard,
the generation of a digital signature using the Digital
Signature Algorithm (DSA) with the key size of 1024 bits
and RSA with the key size of less than 2048 bits is
disallowed after the year 2013. After this update,
ssh-keygen no longer generates keys with less than 2048
bits in FIPS mode. However, the sshd service accepts
keys of size 1024 bits as well as larger keys for
compatibility reasons.

- Previously, the openssh utility incorrectly set the
oom_adj value to -17 for all of its children processes.
This behavior was incorrect because the children
processes were supposed to have this value set to 0.
This update applies a patch to fix this bug and oom_adj
is now properly set to 0 for all children processes as
expected.

- Previously, if the sshd service failed to verify the
checksum of an installed FIPS module using the fipscheck
library, the information about this failure was only
provided at the standard error output of sshd. As a
consequence, the user could not notice this message and
be uninformed when a system had not been properly
configured for FIPS mode. To fix this bug, this behavior
has been changed and sshd now sends such messages via
the syslog service.

- When keys provided by the pkcs11 library were removed
from the ssh agent using the 'ssh-add -e' command, the
user was prompted to enter a PIN. With this update, a
patch has been applied to allow the user to remove the
keys provided by pkcs11 without the PIN.

In addition, this update adds the following enhancements :

- With this update, ControlPersist has been added to
OpenSSH. The option in conjunction with the
ControlMaster configuration directive specifies that the
master connection remains open in the background after
the initial client connection has been closed.

- When the sshd daemon is configured to force the internal
SFTP session, and the user attempts to use a connection
other than SFTP, the appropriate message is logged to
the /var/log/secure file.

- Support for Elliptic Curve Cryptography modes for key
exchange (ECDH) and host user keys (ECDSA) as specified
by RFC5656 has been added to the openssh packages.
However, they are not enabled by default and the user
has to enable them manually.

See also :

http://www.nessus.org/u?0d90dcb6

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Oracle Linux 5 : wireshark (ELSA-2014-1677)


Synopsis:

The remote Oracle Linux host is missing one or more security updates.

Description:

From Red Hat Security Advisory 2014:1677 :

Updated wireshark packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Wireshark is a network protocol analyzer. It is used to capture and
browse the traffic running on a computer network.

Multiple flaws were found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash
or, possibly, execute arbitrary code as the user running Wireshark.
(CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432)

Several denial of service flaws were found in Wireshark. Wireshark
could crash or stop responding if it read a malformed packet off a
network, or opened a malicious dump file. (CVE-2014-6421,
CVE-2014-6422, CVE-2014-6423, CVE-2014-6425, CVE-2014-6428)

All wireshark users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. All running
instances of Wireshark must be restarted for the update to take
effect.

See also :

https://oss.oracle.com/pipermail/el-errata/2014-October/004571.html

Solution :

Update the affected wireshark packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Oracle Linux 6 : rsyslog7 (ELSA-2014-1654)


Synopsis:

The remote Oracle Linux host is missing one or more security updates.

Description:

From Red Hat Security Advisory 2014:1654 :

Updated rsyslog7 packages that fix one security issue are now
available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Important
security impact. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The rsyslog7 packages provide an enhanced, multi-threaded syslog
daemon that supports writing to relational databases, syslog/TCP, RFC
3195, permitted sender lists, filtering on any message part, and fine
grained output format control.

A flaw was found in the way rsyslog handled invalid log message
priority values. In certain configurations, a local attacker, or a
remote attacker able to connect to the rsyslog port, could use this
flaw to crash the rsyslog daemon or, potentially, execute arbitrary
code as the user running the rsyslog daemon. (CVE-2014-3634)

Red Hat would like to thank Rainer Gerhards of rsyslog upstream for
reporting this issue.

All rsyslog7 users are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue. After
installing the update, the rsyslog service will be restarted
automatically.

See also :

https://oss.oracle.com/pipermail/el-errata/2014-October/004562.html

Solution :

Update the affected rsyslog7 packages.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Oracle Linux 6 : java-1.8.0-openjdk (ELSA-2014-1636)


Synopsis:

The remote Oracle Linux host is missing one or more security updates.

Description:

From Red Hat Security Advisory 2014:1636 :

Updated java-1.8.0-openjdk packages that fix multiple security issues
are now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Important
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime
Environment and the OpenJDK 8 Java Software Development Kit.

It was discovered that the Libraries component in OpenJDK failed to
properly handle ZIP archives that contain entries with a NUL byte used
in the file names. An untrusted Java application or applet could use
this flaw to bypass Java sandbox restrictions. (CVE-2014-6562)

Multiple flaws were discovered in the Libraries, 2D, and Hotspot
components in OpenJDK. An untrusted Java application or applet could
use these flaws to bypass certain Java sandbox restrictions.
(CVE-2014-6506, CVE-2014-6531, CVE-2014-6502, CVE-2014-6511,
CVE-2014-6504, CVE-2014-6519)

It was discovered that the StAX XML parser in the JAXP component in
OpenJDK performed expansion of external parameter entities even when
external entity substitution was disabled. A remote attacker could use
this flaw to perform XML eXternal Entity (XXE) attack against
applications using the StAX parser to parse untrusted XML documents.
(CVE-2014-6517)

It was discovered that the Hotspot component in OpenJDK failed to
properly handle malformed Shared Archive files. A local attacker able
to modify a Shared Archive file used by a virtual machine of a
different user could possibly use this flaw to escalate their
privileges. (CVE-2014-6468)

It was discovered that the DatagramSocket implementation in OpenJDK
failed to perform source address checks for packets received on a
connected socket. A remote attacker could use this flaw to have their
packets processed as if they were received from the expected source.
(CVE-2014-6512)

It was discovered that the TLS/SSL implementation in the JSSE
component in OpenJDK failed to properly verify the server identity
during the renegotiation following session resumption, making it
possible for malicious TLS/SSL servers to perform a Triple Handshake
attack against clients using JSSE and client certificate
authentication. (CVE-2014-6457)

It was discovered that the CipherInputStream class implementation in
OpenJDK did not properly handle certain exceptions. This could
possibly allow an attacker to affect the integrity of an encrypted
stream handled by this class. (CVE-2014-6558)

The CVE-2014-6512 was discovered by Florian Weimer of Red Hat Product
Security.

All users of java-1.8.0-openjdk are advised to upgrade to these
updated packages, which resolve these issues. All running instances of
OpenJDK Java must be restarted for the update to take effect.

See also :

https://oss.oracle.com/pipermail/el-errata/2014-October/004573.html

Solution :

Update the affected java-1.8.0-openjdk packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

This script is Copyright (C) 2014 Tenable Network Security, Inc.

openSUSE Security Update : wpa_supplicant (openSUSE-SU-2014:1313-1)


Synopsis:

The remote openSUSE host is missing a security update.

Description:

- add
0001-Add-os_exec-helper-to-run-external-programs.patch

- add
0002-wpa_cli-Use-os_exec-for-action-script-execution.pat
ch

- fixing CVE-2014-3686 (bnc#900611) trying to abuse the
action scripts in wpa_cli

See also :

http://lists.opensuse.org/opensuse-updates/2014-10/msg00027.html
https://bugzilla.opensuse.org/show_bug.cgi?id=900611

Solution :

Update the affected wpa_supplicant packages.

Risk factor :

Medium

This script is Copyright (C) 2014 Tenable Network Security, Inc.

openSUSE Security Update : wpa_supplicant (openSUSE-SU-2014:1314-1)


Synopsis:

The remote openSUSE host is missing a security update.

Description:

- add
0001-Add-os_exec-helper-to-run-external-programs.patch

- add
0002-wpa_cli-Use-os_exec-for-action-script-execution.pat
ch

- fixing CVE-2014-3686 (bnc#900611) trying to abuse the
action scripts in wpa_cli

See also :

http://lists.opensuse.org/opensuse-updates/2014-10/msg00028.html
https://bugzilla.opensuse.org/show_bug.cgi?id=900611

Solution :

Update the affected wpa_supplicant packages.

Risk factor :

Medium

This script is Copyright (C) 2014 Tenable Network Security, Inc.

openSUSE Security Update : getmail (openSUSE-SU-2014:1315-1)


Synopsis:

The remote openSUSE host is missing a security update.

Description:

- getmail 4.46.0 [bnc#900217] This release fixes several
similar vulnerabilities that could allow a
man-in-the-middle attacker to read encrypted traffic due
to pack of certificate verification against the
hostname.

- fix --idle checking Python version incorrectly,
resulting in incorrect warning about running with Python
< 2.5

- add missing support for SSL certificate checking in POP3
which broke POP retrieval in v4.45.0 [CVE-2014-7275]

- includes changes from 4.45.0 :

- perform hostname-vs-certificate matching of SSL
certificate if validating the certifcate [CVE-2014-7274]

- fix missing plaintext versions of documentation

- includes changes from 4.44.0 :

- add extended SSL options for IMAP retrievers, allowing
certificate verification and other features
[CVE-2014-7273]

- fix missing plaintext versions of documentation

- fix 'Header instance has no attribute 'strip'' error
which cropped up in some configurations

See also :

http://lists.opensuse.org/opensuse-updates/2014-10/msg00029.html
https://bugzilla.opensuse.org/show_bug.cgi?id=900217

Solution :

Update the affected getmail package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

FreeBSD : phpMyAdmin -- XSS vulnerabilities in SQL debug output and server monitor page. (25b78f04-59c8-11e4-b711-6805ca0b3d42)


Synopsis:

The remote FreeBSD host is missing a security-related update.

Description:

The phpMyAdmin development team reports :

With a crafted database or table name it is possible to trigger an XSS
in SQL debug output when enabled and in server monitor page when
viewing and analysing executed queries.

This vulnerability can be triggered only by someone who is logged in
to phpMyAdmin, as the usual token protection prevents non-logged-in
users from accessing the required pages. Moreover, debugging SQL is a
developer option which is disabled by default and expected to be
disabled in production environments.

See also :

http://www.phpmyadmin.net/home_page/security/PMASA-2014-12.php
http://www.nessus.org/u?80f5780e

Solution :

Update the affected package.

Risk factor :

High

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Fedora 19 : java-1.8.0-openjdk-1.8.0.25-0.b18.fc19 (2014-13049)


Synopsis:

The remote Fedora host is missing a security update.

Description:

Updated to security u25. Security bugs are same as for
http://blog.fuseyism.com/index.php/2014/10/15/security-icedtea-2-5-3-f
or-openjdk-7-released/

See also :

http://www.nessus.org/u?d4851c44
http://www.nessus.org/u?c8fc5b60

Solution :

Update the affected java-1.8.0-openjdk package.

Risk factor :

High

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Fedora 20 : perl-Mojolicious-5.49-1.fc20 (2014-12719)


Synopsis:

The remote Fedora host is missing a security update.

Description:

This version of Mojolicious fixes an assumption in CGI's parameter
handling that can result in parameter injection attacks.

See also :

http://www.nessus.org/u?d3e31393

Solution :

Update the affected perl-Mojolicious package.

Risk factor :

High

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Fedora 19 : perl-Mojolicious-5.49-1.fc19 (2014-12707)


Synopsis:

The remote Fedora host is missing a security update.

Description:

This version of Mojolicious fixes an assumption in CGI's parameter
handling that can result in parameter injection attacks.

See also :

http://www.nessus.org/u?155be696

Solution :

Update the affected perl-Mojolicious package.

Risk factor :

High

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Fedora 19 : bugzilla-4.2.11-1.fc19 (2014-12584)


Synopsis:

The remote Fedora host is missing a security update.

Description:

Security fix for CVE-2014-1571, CVE-2014-1572, CVE-2014-1573

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=1150091
http://www.nessus.org/u?e919f9cc

Solution :

Update the affected bugzilla package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Fedora 20 : bugzilla-4.2.11-1.fc20 (2014-12530)


Synopsis:

The remote Fedora host is missing a security update.

Description:

Security fix for CVE-2014-1571, CVE-2014-1572, CVE-2014-1573

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=1150091
http://www.nessus.org/u?982a774f

Solution :

Update the affected bugzilla package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

This script is Copyright (C) 2014 Tenable Network Security, Inc.

HP Operations Manager / Operations Agent < 11.13 XSS (HPSBMU03126)


Synopsis:

The remote web server is affected by a cross-site scripting
vulnerability.

Description:

According to its self-reported version, the version of the HP
Operations Agent service running on the remote host is affected by a
cross-site scripting vulnerability. Operations Agent is often an
included component of Operations Manager.

See also :

http://www.nessus.org/u?0b1480af

Solution :

Apply the relevant update referenced in HP Security Bulletin
HPSBMU03126.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

MS KB3010060: Vulnerability in Microsoft OLE Could Allow Remote Code Execution


Synopsis:

The remote host is affected by a remote code execution vulnerability.

Description:

The remote host is missing one of the workarounds referenced in
Microsoft Security Advisory 3010060.

The version of Microsoft Office installed on the remote host is
affected by a remote code execution vulnerability due to a flaw in the
OLE package manager. A remote attacker can exploit this vulnerability
by convincing a user to open an Office file containing specially
crafted OLE objects, resulting in execution of arbitrary code in the
context of the current user.

See also :

https://technet.microsoft.com/library/security/3010060

Solution :

Apply the Microsoft Fix it solution 'OLE packager Shim Workaround' or
deploy the Enhanced Mitigation Experience Toolkit (EMET) 5.0 and
configure Attack Surface Reduction with the settings provided by
Microsoft.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

VLC Media Player < 2.1.5 Multiple Vulnerabilities


Synopsis:

The remote Windows host contains a media player that is affected by
multiple vulnerabilities.

Description:

The version of VLC media player installed on the remote host is prior
to 2.1.5. It is, therefore, affected by the following vulnerabilities :

- An error exists in the 'png_push_read_chunk' function
within the file 'pngpread.c' from the included libpng
library that can allow denial of service attacks.
(CVE-2014-0333)

- A buffer overflow error exists in the
'read_server_hello' function within the file
'lib/gnutls_handshake.c' from the included GnuTLS
library that can allow arbitrary code execution or
a denial of service. (CVE-2014-3466)

See also :

http://www.videolan.org/developers/vlc-branch/NEWS
http://www.videolan.org/vlc/releases/2.1.5.html

Solution :

Upgrade to version 2.1.5 or later.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Cisco TelePresence VCS / Expressway Series < 8.2 Multiple DoS Vulnerabilities


Synopsis:

The remote device is affected by flaws that can allow a denial of
service via a device reload.

Description:

According to the self-reported version, returned by a standard SNMP
request, the version of the Cisco TelePresence VCS or Expressway
Series device prior to 8.2. It is, therefore, potentially affected by
multiple denial of service vulnerabilities :

- A flaw exists in packet processing when processing IP
packets at a high rate. This can allow a remote attacker
to cause a kernel crash via specially crafted packets.
(CVE-2014-3368)

- A flaw in the SIP IX Channel is triggered when handling
a specially crafted SDP packet. This can allow a remote
attacker to cause a system reload. SIP IX Filtering must
be enabled for the system to be affected.
(CVE-2014-3369)

- A flaw exists in the SIP module that can allow a remote
attacker to cause a system reload via a specially
crafted SIP packet. (CVE-2014-3370)

See also :

http://www.nessus.org/u?6ea0f5bf
https://tools.cisco.com/bugsearch/bug/CSCui06507
https://tools.cisco.com/bugsearch/bug/CSCuo42252
https://tools.cisco.com/bugsearch/bug/CSCum60447
https://tools.cisco.com/bugsearch/bug/CSCum60442

Solution :

Upgrade to version 8.2 or later.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Cisco TelePresence MCU Software Memory Exhaustion


Synopsis:

The remote device is affected by a flaw that can allow a denial of
service via memory exhaustion.

Description:

According to the self-reported version, returned by either the SNMP or
FTP service running on the remote device, the Cisco TelePresence MCU
software is affected by a vulnerability that can allow a remote,
unauthenticated attacker to cause a denial of service via memory
exhaustion.

See also :

http://www.nessus.org/u?d8abd8d8
https://tools.cisco.com/bugsearch/bug/CSCtz35468

Solution :

Upgrade to the appropriate software version per the vendor's advisory.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Asterisk Information Disclosure (POODLE) (AST-2014-011)


Synopsis:

The version of Asterisk installed on the remote host may be affected
by an information disclosure vulnerability.

Description:

According to the version in its SIP banner, the version of Asterisk
running on the remote host is potentially affected by an error related
to the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode. A
man-in-the-middle attacker can decrypt a selected byte of a cipher
text in as few as 256 tries if they are able to force a victim
application to repeatedly send the same data over newly created SSL
3.0 connections. This is also known as the 'POODLE' issue.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.

See also :

http://downloads.asterisk.org/pub/security/AST-2014-011.html
https://issues.asterisk.org/jira/browse/ASTERISK-24425
https://www.openssl.org/news/secadv_20141015.txt
https://www.openssl.org/news/vulnerabilities.html
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00

Solution :

Upgrade to Asterisk 1.8.31.1 / 11.13.1 / 12.6.1 / 1.8.28-cert2 /
11.6-cert7 or apply the appropriate patch listed in the Asterisk
advisory.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Scientific Linux Security Update : qemu-kvm on SL7.x x86_64


Synopsis:

The remote Scientific Linux host is missing one or more security
updates.

Description:

An information leak flaw was found in the way QEMU's VGA emulator
accessed frame buffer memory for high resolution displays. A
privileged guest user could use this flaw to leak memory contents of
the host to the guest by setting the display to use a high resolution
in the guest. (CVE-2014-3615)

This update also fixes the following bug :

- This update fixes a regression in the
scsi_block_new_request() function, which caused all read
requests to through SG_IO if the host cache was not
used.

After installing this update, shut down all running virtual machines.
Once all virtual machines have shut down, start them again for this
update to take effect.

See also :

http://www.nessus.org/u?a4284b82

Solution :

Update the affected packages.

Risk factor :

High

This script is Copyright (C) 2014 Tenable Network Security, Inc.

RHEL 5 : wireshark (RHSA-2014:1677)


Synopsis:

The remote Red Hat host is missing one or more security updates.

Description:

Updated wireshark packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Wireshark is a network protocol analyzer. It is used to capture and
browse the traffic running on a computer network.

Multiple flaws were found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash
or, possibly, execute arbitrary code as the user running Wireshark.
(CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432)

Several denial of service flaws were found in Wireshark. Wireshark
could crash or stop responding if it read a malformed packet off a
network, or opened a malicious dump file. (CVE-2014-6421,
CVE-2014-6422, CVE-2014-6423, CVE-2014-6425, CVE-2014-6428)

All wireshark users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. All running
instances of Wireshark must be restarted for the update to take
effect.

See also :

https://www.redhat.com/security/data/cve/CVE-2014-6421.html
https://www.redhat.com/security/data/cve/CVE-2014-6422.html
https://www.redhat.com/security/data/cve/CVE-2014-6423.html
https://www.redhat.com/security/data/cve/CVE-2014-6425.html
https://www.redhat.com/security/data/cve/CVE-2014-6428.html
https://www.redhat.com/security/data/cve/CVE-2014-6429.html
https://www.redhat.com/security/data/cve/CVE-2014-6430.html
https://www.redhat.com/security/data/cve/CVE-2014-6431.html
https://www.redhat.com/security/data/cve/CVE-2014-6432.html
http://rhn.redhat.com/errata/RHSA-2014-1677.html

Solution :

Update the affected wireshark, wireshark-debuginfo and / or
wireshark-gnome packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

This script is Copyright (C) 2014 Tenable Network Security, Inc.

RHEL 6 / 7 : wireshark (RHSA-2014:1676)


Synopsis:

The remote Red Hat host is missing one or more security updates.

Description:

Updated wireshark packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Wireshark is a network protocol analyzer. It is used to capture and
browse the traffic running on a computer network.

Multiple flaws were found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash
or, possibly, execute arbitrary code as the user running Wireshark.
(CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432)

Several denial of service flaws were found in Wireshark. Wireshark
could crash or stop responding if it read a malformed packet off a
network, or opened a malicious dump file. (CVE-2014-6421,
CVE-2014-6422, CVE-2014-6423, CVE-2014-6424, CVE-2014-6425,
CVE-2014-6426, CVE-2014-6427, CVE-2014-6428)

All wireshark users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. All running
instances of Wireshark must be restarted for the update to take
effect.

See also :

https://www.redhat.com/security/data/cve/CVE-2014-6421.html
https://www.redhat.com/security/data/cve/CVE-2014-6422.html
https://www.redhat.com/security/data/cve/CVE-2014-6423.html
https://www.redhat.com/security/data/cve/CVE-2014-6424.html
https://www.redhat.com/security/data/cve/CVE-2014-6425.html
https://www.redhat.com/security/data/cve/CVE-2014-6426.html
https://www.redhat.com/security/data/cve/CVE-2014-6427.html
https://www.redhat.com/security/data/cve/CVE-2014-6428.html
https://www.redhat.com/security/data/cve/CVE-2014-6429.html
https://www.redhat.com/security/data/cve/CVE-2014-6430.html
https://www.redhat.com/security/data/cve/CVE-2014-6431.html
https://www.redhat.com/security/data/cve/CVE-2014-6432.html
http://rhn.redhat.com/errata/RHSA-2014-1676.html

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Oracle Linux 6 / 7 : wireshark (ELSA-2014-1676)


Synopsis:

The remote Oracle Linux host is missing one or more security updates.

Description:

From Red Hat Security Advisory 2014:1676 :

Updated wireshark packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Moderate
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Wireshark is a network protocol analyzer. It is used to capture and
browse the traffic running on a computer network.

Multiple flaws were found in Wireshark. If Wireshark read a malformed
packet off a network or opened a malicious dump file, it could crash
or, possibly, execute arbitrary code as the user running Wireshark.
(CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432)

Several denial of service flaws were found in Wireshark. Wireshark
could crash or stop responding if it read a malformed packet off a
network, or opened a malicious dump file. (CVE-2014-6421,
CVE-2014-6422, CVE-2014-6423, CVE-2014-6424, CVE-2014-6425,
CVE-2014-6426, CVE-2014-6427, CVE-2014-6428)

All wireshark users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. All running
instances of Wireshark must be restarted for the update to take
effect.

See also :

https://oss.oracle.com/pipermail/el-errata/2014-October/004557.html
https://oss.oracle.com/pipermail/el-errata/2014-October/004559.html

Solution :

Update the affected wireshark packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Oracle Linux 6 : kernel (ELSA-2014-1392)


Synopsis:

The remote Oracle Linux host is missing one or more security updates.

Description:

From Red Hat Security Advisory 2014:1392 :

Updated kernel packages that fix multiple security issues, address
several hundred bugs, and add numerous enhancements are now available
as part of the ongoing support and maintenance of Red Hat Enterprise
Linux version 6. This is the sixth regular update.

Red Hat Product Security has rated this update as having Important
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

* A NULL pointer dereference flaw was found in the way the Linux
kernel's Stream Control Transmission Protocol (SCTP) implementation
handled simultaneous connections between the same hosts. A remote
attacker could use this flaw to crash the system. (CVE-2014-5077,
Important)

* An integer overflow flaw was found in the way the Linux kernel's
Frame Buffer device implementation mapped kernel memory to user space
via the mmap syscall. A local user able to access a frame buffer
device file (/dev/fb*) could possibly use this flaw to escalate their
privileges on the system. (CVE-2013-2596, Important)

* A flaw was found in the way the ipc_rcu_putref() function in the
Linux kernel's IPC implementation handled reference counter
decrementing. A local, unprivileged user could use this flaw to
trigger an Out of Memory (OOM) condition and, potentially, crash the
system. (CVE-2013-4483, Moderate)

* It was found that the permission checks performed by the Linux
kernel when a netlink message was received were not sufficient. A
local, unprivileged user could potentially bypass these restrictions
by passing a netlink socket as stdout or stderr to a more privileged
process and altering the output of this process. (CVE-2014-0181,
Moderate)

* It was found that the try_to_unmap_cluster() function in the Linux
kernel's Memory Managment subsystem did not properly handle page
locking in certain cases, which could potentially trigger the BUG_ON()
macro in the mlock_vma_page() function. A local, unprivileged user
could use this flaw to crash the system. (CVE-2014-3122, Moderate)

* A flaw was found in the way the Linux kernel's kvm_iommu_map_pages()
function handled IOMMU mapping failures. A privileged user in a guest
with an assigned host device could use this flaw to crash the host.
(CVE-2014-3601, Moderate)

* Multiple use-after-free flaws were found in the way the Linux
kernel's Advanced Linux Sound Architecture (ALSA) implementation
handled user controls. A local, privileged user could use either of
these flaws to crash the system. (CVE-2014-4653, CVE-2014-4654,
CVE-2014-4655, Moderate)

* A flaw was found in the way the Linux kernel's VFS subsystem handled
reference counting when performing unmount operations on symbolic
links. A local, unprivileged user could use this flaw to exhaust all
available memory on the system or, potentially, trigger a
use-after-free error, resulting in a system crash or privilege
escalation. (CVE-2014-5045, Moderate)

* An integer overflow flaw was found in the way the
lzo1x_decompress_safe() function of the Linux kernel's LZO
implementation processed Literal Runs. A local attacker could, in
extremely rare cases, use this flaw to crash the system or,
potentially, escalate their privileges on the system. (CVE-2014-4608,
Low)

Red Hat would like to thank Vladimir Davydov of Parallels for
reporting CVE-2013-4483, Jack Morgenstein of Mellanox for reporting
CVE-2014-3601, Vasily Averin of Parallels for reporting CVE-2014-5045,
and Don A. Bailey from Lab Mouse Security for reporting CVE-2014-4608.
The security impact of the CVE-2014-3601 issue was discovered by
Michael Tsirkin of Red Hat.

This update also fixes several hundred bugs and adds numerous
enhancements. Refer to the Red Hat Enterprise Linux 6.6 Release Notes
for information on the most significant of these changes, and the
Technical Notes for further information, both linked to in the
References.

All Red Hat Enterprise Linux 6 users are advised to install these
updated packages, which correct these issues, and fix the bugs and add
the enhancements noted in the Red Hat Enterprise Linux 6.6 Release
Notes and Technical Notes. The system must be rebooted for this update
to take effect.

See also :

https://oss.oracle.com/pipermail/el-errata/2014-October/004556.html

Solution :

Update the affected kernel packages.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Mandriva Linux Security Advisory : kernel (MDVSA-2014:201)


Synopsis:

The remote Mandriva Linux host is missing one or more security
updates.

Description:

Multiple vulnerabilities has been found and corrected in the Linux
kernel :

The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel
before 3.14.3 does not properly consider which pages must be locked,
which allows local users to cause a denial of service (system crash)
by triggering a memory-usage pattern that requires removal of
page-table mappings (CVE-2014-3122).

Multiple stack-based buffer overflows in the magicmouse_raw_event
function in drivers/hid/hid-magicmouse.c in the Magic Mouse HID driver
in the Linux kernel through 3.16.3 allow physically proximate
attackers to cause a denial of service (system crash) or possibly
execute arbitrary code via a crafted device that provides a large
amount of (1) EHCI or (2) XHCI data associated with an event
(CVE-2014-3181).

Array index error in the logi_dj_raw_event function in
drivers/hid/hid-logitech-dj.c in the Linux kernel before 3.16.2 allows
physically proximate attackers to execute arbitrary code or cause a
denial of service (invalid kfree) via a crafted device that provides a
malformed REPORT_TYPE_NOTIF_DEVICE_UNPAIRED value (CVE-2014-3182).

The report_fixup functions in the HID subsystem in the Linux kernel
before 3.16.2 might allow physically proximate attackers to cause a
denial of service (out-of-bounds write) via a crafted device that
provides a small report descriptor, related to (1)
drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3)
drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5)
drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c
(CVE-2014-3184).

Multiple buffer overflows in the command_port_read_callback function
in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver
in the Linux kernel before 3.16.2 allow physically proximate attackers
to execute arbitrary code or cause a denial of service (memory
corruption and system crash) via a crafted device that provides a
large amount of (1) EHCI or (2) XHCI data associated with a bulk
response (CVE-2014-3185).

Buffer overflow in the picolcd_raw_event function in
devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the
Linux kernel through 3.16.3, as used in Android on Nexus 7 devices,
allows physically proximate attackers to cause a denial of service
(system crash) or possibly execute arbitrary code via a crafted device
that sends a large report (CVE-2014-3186).

arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the
s390 platform does not properly restrict address-space control
operations in PTRACE_POKEUSR_AREA requests, which allows local users
to obtain read and write access to kernel memory locations, and
consequently gain privileges, via a crafted application that makes a
ptrace system call (CVE-2014-3534).

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux
kernel through 3.16.1 miscalculates the number of pages during the
handling of a mapping failure, which allows guest OS users to (1)
cause a denial of service (host OS memory corruption) or possibly have
unspecified other impact by triggering a large gfn value or (2) cause
a denial of service (host OS memory consumption) by triggering a small
gfn value that leads to permanently pinned pages (CVE-2014-3601).

The sctp_assoc_update function in net/sctp/associola.c in the Linux
kernel through 3.15.8, when SCTP authentication is enabled, allows
remote attackers to cause a denial of service (NULL pointer
dereference and OOPS) by starting to establish an association between
two endpoints immediately after an exchange of INIT and INIT ACK
chunks to establish an earlier association between these endpoints in
the opposite direction (CVE-2014-5077).

The do_remount function in fs/namespace.c in the Linux kernel through
3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of
a bind mount, which allows local users to bypass an intended read-only
restriction and defeat certain sandbox protection mechanisms via a
mount -o remount command within a user namespace (CVE-2014-5206).

Stack consumption vulnerability in the parse_rock_ridge_inode_internal
function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows
local users to cause a denial of service (uncontrolled recursion, and
system crash or reboot) via a crafted iso9660 image with a CL entry
referring to a directory entry that has a CL entry (CVE-2014-5471).

The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
Linux kernel through 3.16.1 allows local users to cause a denial of
service (unkillable mount process) via a crafted iso9660 image with a
self-referential CL entry (CVE-2014-5472).

The __udf_read_inode function in fs/udf/inode.c in the Linux kernel
through 3.16.3 does not restrict the amount of ICB indirection, which
allows physically proximate attackers to cause a denial of service
(infinite loop or stack consumption) via a UDF filesystem with a
crafted inode (CVE-2014-6410).

The do_umount function in fs/namespace.c in the Linux kernel through
3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb
calls that change the root filesystem to read-only, which allows local
users to cause a denial of service (loss of writability) by making
certain unshare system calls, clearing the / MNT_LOCKED flag, and
making an MNT_FORCE umount system call (CVE-2014-7975).

The updated packages provides a solution for these security issues.

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Mandriva Linux Security Advisory : bugzilla (MDVSA-2014:200)


Synopsis:

The remote Mandriva Linux host is missing one or more security
updates.

Description:

Updated bugzilla packages fix security vulnerabilities :

If a new comment was marked private to the insider group, and a flag
was set in the same transaction, the comment would be visible to flag
recipients even if they were not in the insider group (CVE-2014-1571).

An attacker creating a new Bugzilla account can override certain
parameters when finalizing the account creation that can lead to the
user being created with a different email address than originally
requested. The overridden login name could be automatically added to
groups based on the group's regular expression setting
(CVE-2014-1572).

During an audit of the Bugzilla code base, several places were found
where cross-site scripting exploits could occur which could allow an
attacker to access sensitive information (CVE-2014-1573).

See also :

http://advisories.mageia.org/MGASA-2014-0412.html

Solution :

Update the affected bugzilla and / or bugzilla-contrib packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

This script is Copyright (C) 2014 Tenable Network Security, Inc.