openSUSE Security Update : kernel (openSUSE-SU-2014:0678-1)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This Linux kernel security update fixes various security issues and
bugs.

The Linux Kernel was updated to fix various security issues and bugs.

Main security issues fixed :

A security issue in the tty layer that was fixed that could be used by
local attackers for code execution (CVE-2014-0196).

Two security issues in the floppy driver were fixed that could be used
by local attackers on machines with the floppy to crash the kernel or
potentially execute code in the kernel (CVE-2014-1737 CVE-2014-1738).

Other security issues and bugfixes :

- netfilter: nf_nat: fix access to uninitialized buffer in
IRC NAT helper (bnc#860835 CVE-2014-1690).

- net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer
is AUTH (bnc#866102, CVE-2014-0101).

- [media] ivtv: Fix Oops when no firmware is loaded
(bnc#875440).

- ALSA: hda - Add dock pin setups for Thinkpad T440
(bnc#876699).

- ip6tnl: fix double free of fb_tnl_dev on exit
(bnc#876531).

- Update arm config files: Enable all USB-to-serial
drivers Specifically, enable USB_SERIAL_WISHBONE and
USB_SERIAL_QT2 on all arm flavors.

- mei: limit the number of consecutive resets
(bnc#821619,bnc#852656).

- mei: revamp mei reset state machine
(bnc#821619,bnc#852656).

- mei: use hbm idle state to prevent spurious resets
(bnc#821619).

- mei: do not run reset flow from the interrupt thread
(bnc#821619,bnc#852656).

- mei: don't get stuck in select during reset
(bnc#821619).

- mei: wake also writers on reset (bnc#821619).

- mei: remove flash_work_queue (bnc#821619,bnc#852656).

- mei: me: do not load the driver if the FW doesn't
support MEI interface (bnc#821619).

- Update ec2 config files: Disable CONFIG_CAN CAN support
is disabled everywhere else, so disable it in ec2 too.

- Refresh Xen patches (bnc#851244).

- Update arm/exynos config file: disable AHCI_IMX This
driver is only used on Freescale i.MX systems so it
isn't needed on Exynos.

- drm: Prefer noninterlace cmdline mode unless explicitly
specified (bnc#853350).

- kabi/severities: add exception for irda. The changes
resulted in a 4x performance increase. Any external
users of this API will also want to rebuild their
modules.

- i7core_edac: Fix PCI device reference count.

- KABI: revert tcp: TSO packets automatic sizing.

- KABI: revert tcp: TSQ can use a dynamic limit.

- kabi: add exceptions for kvm and l2tp

-
patches.fixes/sunrpc-add-an-info-file-for-the-dummy-gssd
-pipe.patch: Move include of utsname.h to where it's
needed to avoid kABI breakage due to utsname becoming
defined.

- Update kabi files. The kABI references were never
establishd at release.

- Refresh patches.rpmify/chipidea-clean-up-dependencies
Replace OF_DEVICE by OF (OF_DEVICE does not exist
anymore.)

- inet: fix addr_len/msg->msg_namelen assignment in
recv_error and rxpmtu functions (bnc#857643
CVE-2013-7263 CVE-2013-7264 CVE-2013-7265).

- inet: prevent leakage of uninitialized memory to user in
recv syscalls (bnc#857643 CVE-2013-7263 CVE-2013-7264
CVE-2013-7265 CVE-2013-7281).

- Update config files: re-enable twofish crypto support
Software twofish crypto support was disabled in several
architectures since openSUSE 10.3. For i386 and x86_64
it was on purpose, because hardware-accelerated
alternatives exist. However for all other architectures
it was by accident. Re-enable software twofish crypto
support in arm, ia64 and ppc configuration files, to
guarantee that at least one implementation is always
available (bnc#871325).

- kvm: optimize away THP checks in kvm_is_mmio_pfn()
(bnc#871160).

- Update patches.fixes/mm-close-PageTail-race.patch
(bnc#871160).

- Update
patches.fixes/mm-hugetlbfs-fix-hugetlbfs-optimization.pa
tch (bnc#871160).

- mm: close PageTail race (bnc#81660).

- mm: hugetlbfs: fix hugetlbfs optimization (bnc#81660).

- Update config files: disable CONFIG_TOUCHSCREEN_W90X900
The w90p910_ts driver only makes sense on the W90x900
architecture, which we do not support.

- ath9k: protect tid->sched check
(bnc#871148,CVE-2014-2672).

- Update ec2 config files: disable CONFIG_INPUT_FF_MEMLESS
This helper module is useless on EC2.

- SELinux: Fix kernel BUG on empty security contexts
(bnc#863335,CVE-2014-1874).

- hamradio/yam: fix info leak in ioctl
(bnc#858872,CVE-2014-1446).

- netfilter: nf_conntrack_dccp: fix skb_header_pointer API
usages (bnc#868653 CVE-2014-2523).

- ath9k_htc: properly set MAC address and BSSID mask
(bnc#851426,CVE-2013-4579).

- drm/ttm: don't oops if no invalidate_caches()
(bnc#869414).

- Btrfs: do not bug_on if we try to cow a free space cache
inode (bnc#863235).

- Update vanilla config files: enable console rotation
It's enabled in all other kernel flavors so it should be
enabled in vanilla too.

- Update config files. (CONFIG_EFIVAR_FS=m) Due to systemd
can auto-load efivarfs.ko, so wet CONFIG_EFIVAR_FS to
module on x86_64.

- libata, freezer: avoid block device removal while system
is frozen (bnc#849334).

- Enable CONFIG_IRDA_FAST_RR=y (bnc#860502)

- [media] bttv: don't setup the controls if there are no
video devices (bnc#861750).

- drm/i915/dp: add native aux defer retry limit
(bnc#867718).

- drm/i915/dp: increase native aux defer retry timeout
(bnc#867718).

- rpc_pipe: fix cleanup of dummy gssd directory when
notification fails (bnc#862746).

- sunrpc: add an 'info' file for the dummy gssd pipe
(bnc#862746).

- rpc_pipe: remove the clntXX dir if creating the pipe
fails (bnc#862746).

- Delete rpm/_constraints after mismerge

Sat Mar 8 00:41:07 CET 2014 - [email protected]

- Refresh
patches.fixes/tcp-syncookies-reduce-cookie-lifetime-to-1
28-seconds.patch.

- tcp: syncookies: reduce cookie lifetime to 128 seconds
(bnc#833968).

- tcp: syncookies: reduce mss table to four values
(bnc#833968).

- rpm/mkspec: Generate a per-architecture per-package
_constraints file

- rpm/mkspec: Remove dead code

- Refresh
patches.fixes/rtc-cmos-add-an-alarm-disable-quirk.patch.

- rtc-cmos: Add an alarm disable quirk (bnc#812592).

- Refresh patches.xen/xen-x86-EFI.

- Refresh
patches.apparmor/apparmor-compatibility-patch-for-v5-net
work-control.
patches.drivers/pstore_disable_efi_backend_by_default.pa
tch. patches.fixes/dm-table-switch-to-readonly.
patches.fixes/kvm-ioapic.patch.
patches.fixes/kvm-macos.patch.
patches.fixes/remount-no-shrink-dcache.
patches.fixes/scsi-dh-queuedata-accessors.
patches.suse/0001-vfs-Hooks-for-more-fine-grained-direct
ory-permission.patch.
patches.suse/ovl01-vfs-add-i_op-dentry_open.patch.
patches.suse/sd_init.mark_majors_busy.patch.

- rpm/mkspec: Fix whitespace in NoSource lines

- rpm/kernel-binary.spec.in: Do not zero modules.dep
before using it (bnc#866075)

- rpm/kernel-obs-build.spec: Drop useless ExclusiveArch
statement

- Update config files. Set CONFIG_EFIVAR_FS to build-in
for MOK support Update config files. Set
CONFIG_EFIVAR_FS to build-in for MOK support

- nfs: always make sure page is up-to-date before
extending a write to cover the entire page (bnc#864867
bnc#865075).

- x86, cpu, amd: Add workaround for family 16h, erratum
793 (bnc#852967 CVE-2013-6885).

- Refresh patches.xen/xen3-patch-3.10.

- cifs: ensure that uncached writes handle unmapped areas
correctly (bnc#864025 CVE-2014-0069).

- x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround
(bnc#858638 CVE-2014-1438).

- rpm/kernel-obs-build.spec: Do not mount /sys, the build
script does it

- Update config files: Disable TS5500-specific drivers
These drivers are useless without TS5500 board support:
mtd-ts5500, gpio-ts5500 and max197.

- balloon: don't crash in HVM-with-PoD guests.

- usbback: fix after c/s 1232:8806dfb939d4 (bnc#842553).

- hwmon: (coretemp) Fix truncated name of alarm
attributes.

- rpm/kernel-obs-build.spec: Fix for ppc64le

- Scripts: .nosrc.rpm should contain only the specfile
(bnc #639379)

- config: update arm7hl/exynos

- Enhances exynos support :

- Add USB support

- Add sound support

- Add devices (accelerometer, etc.) on arndale board

- drm/cirrus: Fix cirrus drm driver for fbdev + qemu
(bnc#856760).

- Spec: zeroing modules.dep to get identical builds among
different machines

- doc/README.SUSE: Update to match the current package
layout

- Add the README.SUSE file to the packaging branch

- lockd: send correct lock when granting a delayed lock
(bnc#859342).

- mm/page-writeback.c: do not count anon pages as
dirtyable memory (reclaim stalls).

- mm/page-writeback.c: fix dirty_balance_reserve
subtraction from dirtyable memory (reclaim stalls).

See also :

http://lists.opensuse.org/opensuse-updates/2014-05/msg00056.html
https://bugzilla.novell.com/show_bug.cgi?id=639379
https://bugzilla.novell.com/show_bug.cgi?id=812592
https://bugzilla.novell.com/show_bug.cgi?id=81660
https://bugzilla.novell.com/show_bug.cgi?id=821619
https://bugzilla.novell.com/show_bug.cgi?id=833968
https://bugzilla.novell.com/show_bug.cgi?id=842553
https://bugzilla.novell.com/show_bug.cgi?id=849334
https://bugzilla.novell.com/show_bug.cgi?id=851244
https://bugzilla.novell.com/show_bug.cgi?id=851426
https://bugzilla.novell.com/show_bug.cgi?id=852656
https://bugzilla.novell.com/show_bug.cgi?id=852967
https://bugzilla.novell.com/show_bug.cgi?id=853350
https://bugzilla.novell.com/show_bug.cgi?id=856760
https://bugzilla.novell.com/show_bug.cgi?id=857643
https://bugzilla.novell.com/show_bug.cgi?id=858638
https://bugzilla.novell.com/show_bug.cgi?id=858872
https://bugzilla.novell.com/show_bug.cgi?id=859342
https://bugzilla.novell.com/show_bug.cgi?id=860502
https://bugzilla.novell.com/show_bug.cgi?id=860835
https://bugzilla.novell.com/show_bug.cgi?id=861750
https://bugzilla.novell.com/show_bug.cgi?id=862746
https://bugzilla.novell.com/show_bug.cgi?id=863235
https://bugzilla.novell.com/show_bug.cgi?id=863335
https://bugzilla.novell.com/show_bug.cgi?id=864025
https://bugzilla.novell.com/show_bug.cgi?id=864867
https://bugzilla.novell.com/show_bug.cgi?id=865075
https://bugzilla.novell.com/show_bug.cgi?id=866075
https://bugzilla.novell.com/show_bug.cgi?id=866102
https://bugzilla.novell.com/show_bug.cgi?id=867718
https://bugzilla.novell.com/show_bug.cgi?id=868653
https://bugzilla.novell.com/show_bug.cgi?id=869414
https://bugzilla.novell.com/show_bug.cgi?id=871148
https://bugzilla.novell.com/show_bug.cgi?id=871160
https://bugzilla.novell.com/show_bug.cgi?id=871252
https://bugzilla.novell.com/show_bug.cgi?id=871325
https://bugzilla.novell.com/show_bug.cgi?id=875440
https://bugzilla.novell.com/show_bug.cgi?id=875690
https://bugzilla.novell.com/show_bug.cgi?id=875798
https://bugzilla.novell.com/show_bug.cgi?id=876531
https://bugzilla.novell.com/show_bug.cgi?id=876699

Solution :

Update the affected kernel packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now