openSUSE Security Update : the Linux Kernel (openSUSE-SU-2014:1677-1)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

The openSUSE 13.1 kernel was updated to fix security issues and bugs :

Security issues fixed: CVE-2014-9322: A local privilege escalation in
the x86_64 32bit compatibility signal handling was fixed, which could
be used by local attackers to crash the machine or execute code.

CVE-2014-9090: The do_double_fault function in arch/x86/kernel/traps.c
in the Linux kernel did not properly handle faults associated with the
Stack Segment (SS) segment register, which allowed local users to
cause a denial of service (panic) via a modify_ldt system call, as
demonstrated by sigreturn_32 in the linux-clock-tests test suite.

CVE-2014-8133: Insufficient validation of TLS register usage could
leak information from the kernel stack to userspace.

CVE-2014-0181: The Netlink implementation in the Linux kernel through
3.14.1 did not provide a mechanism for authorizing socket operations
based on the opener of a socket, which allowed local users to bypass
intended access restrictions and modify network configurations by
using a Netlink socket for the (1) stdout or (2) stderr of a setuid
program. (bsc#875051)

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel on
32-bit x86 platforms, when syscall auditing is enabled and the sep CPU
feature flag is set, allowed local users to cause a denial of service
(OOPS and system crash) via an invalid syscall number, as demonstrated
by number 1000.

CVE-2014-3688: The SCTP implementation in the Linux kernel allowed
remote attackers to cause a denial of service (memory consumption) by
triggering a large number of chunks in an association's output queue,
as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and
net/sctp/sm_statefuns.c.

CVE-2014-3687: The sctp_assoc_lookup_asconf_ack function in
net/sctp/associola.c in the SCTP implementation in the Linux kernel
allowed remote attackers to cause a denial of service (panic) via
duplicate ASCONF chunks that trigger an incorrect uncork within the
side-effect interpreter.

CVE-2014-7975: The do_umount function in fs/namespace.c in the Linux
kernel did not require the CAP_SYS_ADMIN capability for do_remount_sb
calls that change the root filesystem to read-only, which allowed
local users to cause a denial of service (loss of writability) by
making certain unshare system calls, clearing the / MNT_LOCKED flag,
and making an MNT_FORCE umount system call.

CVE-2014-8884: Stack-based buffer overflow in the
ttusbdecfe_dvbs_diseqc_send_master_cmd function in
drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel allowed
local users to cause a denial of service (system crash) or possibly
gain privileges via a large message length in an ioctl call.

CVE-2014-3673: The SCTP implementation in the Linux kernel allowed
remote attackers to cause a denial of service (system crash) via a
malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and
net/sctp/sm_statefuns.c.

CVE-2014-3186: Buffer overflow in the picolcd_raw_event function in
devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the
Linux kernel, as used in Android on Nexus 7 devices, allowed
physically proximate attackers to cause a denial of service (system
crash) or possibly execute arbitrary code via a crafted device that
sends a large report.

CVE-2014-7841: The sctp_process_param function in
net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux
kernel, when ASCONF is used, allowed remote attackers to cause a
denial of service (NULL pointer dereference and system crash) via a
malformed INIT chunk.

CVE-2014-4611: Integer overflow in the LZ4 algorithm implementation,
as used in Yann Collet LZ4 before r118 and in the lz4_uncompress
function in lib/lz4/lz4_decompress.c in the Linux kernel before
3.15.2, on 32-bit platforms might allow context-dependent attackers to
cause a denial of service (memory corruption) or possibly have
unspecified other impact via a crafted Literal Run that would be
improperly handled by programs not complying with an API limitation, a
different vulnerability than CVE-2014-4715.

CVE-2014-4608: Multiple integer overflows in the lzo1x_decompress_safe
function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in
the Linux kernel allowed context-dependent attackers to cause a denial
of service (memory corruption) via a crafted Literal Run.

CVE-2014-8709: The ieee80211_fragment function in net/mac80211/tx.c in
the Linux kernel did not properly maintain a certain tail pointer,
which allowed remote attackers to obtain sensitive cleartext
information by reading packets.

CVE-2014-3185: Multiple buffer overflows in the
command_port_read_callback function in drivers/usb/serial/whiteheat.c
in the Whiteheat USB Serial Driver in the Linux kernel allowed
physically proximate attackers to execute arbitrary code or cause a
denial of service (memory corruption and system crash) via a crafted
device that provides a large amount of (1) EHCI or (2) XHCI data
associated with a bulk response.

CVE-2014-3184: The report_fixup functions in the HID subsystem in the
Linux kernel might have allowed physically proximate attackers to
cause a denial of service (out-of-bounds write) via a crafted device
that provides a small report descriptor, related to (1)
drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3)
drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5)
drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.

CVE-2014-3182: Array index error in the logi_dj_raw_event function in
drivers/hid/hid-logitech-dj.c in the Linux kernel allowed physically
proximate attackers to execute arbitrary code or cause a denial of
service (invalid kfree) via a crafted device that provides a malformed
REPORT_TYPE_NOTIF_DEVICE_UNPAIRED value.

CVE-2014-3181: Multiple stack-based buffer overflows in the
magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the
Magic Mouse HID driver in the Linux kernel allowed physically
proximate attackers to cause a denial of service (system crash) or
possibly execute arbitrary code via a crafted device that provides a
large amount of (1) EHCI or (2) XHCI data associated with an event.

CVE-2014-7826: kernel/trace/trace_syscalls.c in the Linux kernel did
not properly handle private syscall numbers during use of the ftrace
subsystem, which allowed local users to gain privileges or cause a
denial of service (invalid pointer dereference) via a crafted
application.

CVE-2013-7263: The Linux kernel updated certain length values before
ensuring that associated data structures have been initialized, which
allowed local users to obtain sensitive information from kernel stack
memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call,
related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c,
net/ipv6/raw.c, and net/ipv6/udp.c. This update fixes the leak of the
port number when using ipv6 sockets. (bsc#853040).

CVE-2013-2898: Fixed potential kernel caller confusion via
past-end-of-heap-allocation read in sensor-hub HID driver.

CVE-2013-2891: Fixed 16 byte past-end-of-heap-alloc zeroing in
steelseries HID driver.

VE-2014-6410: The __udf_read_inode function in fs/udf/inode.c in the
Linux kernel did not restrict the amount of ICB indirection, which
allowed physically proximate attackers to cause a denial of service
(infinite loop or stack consumption) via a UDF filesystem with a
crafted inode.

CVE-2014-5471: Stack consumption vulnerability in the
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
Linux kernel allowed local users to cause a denial of service
(uncontrolled recursion, and system crash or reboot) via a crafted
iso9660 image with a CL entry referring to a directory entry that has
a CL entry.

CVE-2014-5472: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel allowed local users to cause a
denial of service (unkillable mount process) via a crafted iso9660
image with a self-referential CL entry.

CVE-2014-0206: Array index error in the aio_read_events_ring function
in fs/aio.c in the Linux kernel allowed local users to obtain
sensitive information from kernel memory via a large head value.

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel on
32-bit x86 platforms, when syscall auditing is enabled and the sep CPU
feature flag is set, allowed local users to cause a denial of service
(OOPS and system crash) via an invalid syscall number, as demonstrated
by number 1000.

CVE-2014-5206: The do_remount function in fs/namespace.c in the Linux
kernel did not maintain the MNT_LOCK_READONLY bit across a remount of
a bind mount, which allowed local users to bypass an intended
read-only restriction and defeat certain sandbox protection mechanisms
via a 'mount -o remount' command within a user namespace.

CVE-2014-5207: fs/namespace.c in the Linux kernel did not properly
restrict clearing MNT_NODEV, MNT_NOSUID, and MNT_NOEXEC and changing
MNT_ATIME_MASK during a remount of a bind mount, which allowed local
users to gain privileges, interfere with backups and auditing on
systems that had atime enabled, or cause a denial of service
(excessive filesystem updating) on systems that had atime disabled via
a 'mount -o remount' command within a user namespace.

CVE-2014-1739: The media_device_enum_entities function in
drivers/media/media-device.c in the Linux kernel did not initialize a
certain data structure, which allowed local users to obtain sensitive
information from kernel memory by leveraging /dev/media0 read access
for a MEDIA_IOC_ENUM_ENTITIES ioctl call.

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
Linux kernel allowed local users to gain privileges by leveraging
data-structure differences between an l2tp socket and an inet socket.

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel on
32-bit x86 platforms, when syscall auditing is enabled and the sep CPU
feature flag is set, allowed local users to cause a denial of service
(OOPS and system crash) via an invalid syscall number, as demonstrated
by number 1000.

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c
in the Linux kernel, when SCTP authentication is enabled, allowed
remote attackers to cause a denial of service (NULL pointer
dereference and OOPS) by starting to establish an association between
two endpoints immediately after an exchange of INIT and INIT ACK
chunks to establish an earlier association between these endpoints in
the opposite direction.

CVE-2014-4171: mm/shmem.c in the Linux kernel did not properly
implement the interaction between range notification and hole
punching, which allowed local users to cause a denial of service
(i_mutex hold) by using the mmap system call to access a hole, as
demonstrated by interfering with intended shmem activity by blocking
completion of (1) an MADV_REMOVE madvise call or (2) an
FALLOC_FL_PUNCH_HOLE fallocate call.

Also the following bugs were fixed :

- KEYS: Fix stale key registration at error path
(bnc#908163).

- parport: parport_pc, do not remove parent devices early
(bnc#856659).

- xfs: fix directory hash ordering bug.

- xfs: mark all internal workqueues as freezable
(bnc#899785).

- [media] uvc: Fix destruction order in uvc_delete()
(bnc#897736).

- cfq-iosched: Fix wrong children_weight calculation
(bnc#893429).

- target/rd: Refactor rd_build_device_space +
rd_release_device_space (bnc#882639).

- Btrfs: Fix memory corruption by ulist_add_merge() on
32bit arch (bnc#887046).

- usb: pci-quirks: Prevent Sony VAIO t-series from
switching usb ports (bnc#864375).

- xhci: Switch only Intel Lynx Point-LP ports to EHCI on
shutdown (bnc#864375).

- xhci: Switch Intel Lynx Point ports to EHCI on shutdown
(bnc#864375).

- ALSA: hda - Fix broken PM due to incomplete i915
initialization (bnc#890114).

- netbk: Don't destroy the netdev until the vif is shut
down (bnc#881008).

- swiotlb: don't assume PA 0 is invalid (bnc#865882).

- PM / sleep: Fix request_firmware() error at resume
(bnc#873790).

- usbcore: don't log on consecutive debounce failures of
the same port (bnc#818966).

See also :

http://lists.opensuse.org/opensuse-updates/2014-12/msg00076.html
https://bugzilla.opensuse.org/show_bug.cgi?id=818966
https://bugzilla.opensuse.org/show_bug.cgi?id=835839
https://bugzilla.opensuse.org/show_bug.cgi?id=853040
https://bugzilla.opensuse.org/show_bug.cgi?id=856659
https://bugzilla.opensuse.org/show_bug.cgi?id=864375
https://bugzilla.opensuse.org/show_bug.cgi?id=865882
https://bugzilla.opensuse.org/show_bug.cgi?id=873790
https://bugzilla.opensuse.org/show_bug.cgi?id=875051
https://bugzilla.opensuse.org/show_bug.cgi?id=881008
https://bugzilla.opensuse.org/show_bug.cgi?id=882639
https://bugzilla.opensuse.org/show_bug.cgi?id=882804
https://bugzilla.opensuse.org/show_bug.cgi?id=883518
https://bugzilla.opensuse.org/show_bug.cgi?id=883724
https://bugzilla.opensuse.org/show_bug.cgi?id=883948
https://bugzilla.opensuse.org/show_bug.cgi?id=883949
https://bugzilla.opensuse.org/show_bug.cgi?id=884324
https://bugzilla.opensuse.org/show_bug.cgi?id=887046
https://bugzilla.opensuse.org/show_bug.cgi?id=887082
https://bugzilla.opensuse.org/show_bug.cgi?id=889173
https://bugzilla.opensuse.org/show_bug.cgi?id=890114
https://bugzilla.opensuse.org/show_bug.cgi?id=891689
https://bugzilla.opensuse.org/show_bug.cgi?id=892490
https://bugzilla.opensuse.org/show_bug.cgi?id=893429
https://bugzilla.opensuse.org/show_bug.cgi?id=896382
https://bugzilla.opensuse.org/show_bug.cgi?id=896385
https://bugzilla.opensuse.org/show_bug.cgi?id=896390
https://bugzilla.opensuse.org/show_bug.cgi?id=896391
https://bugzilla.opensuse.org/show_bug.cgi?id=896392
https://bugzilla.opensuse.org/show_bug.cgi?id=896689
https://bugzilla.opensuse.org/show_bug.cgi?id=897736
https://bugzilla.opensuse.org/show_bug.cgi?id=899785
https://bugzilla.opensuse.org/show_bug.cgi?id=900392
https://bugzilla.opensuse.org/show_bug.cgi?id=902346
https://bugzilla.opensuse.org/show_bug.cgi?id=902349
https://bugzilla.opensuse.org/show_bug.cgi?id=902351
https://bugzilla.opensuse.org/show_bug.cgi?id=904013
https://bugzilla.opensuse.org/show_bug.cgi?id=904700
https://bugzilla.opensuse.org/show_bug.cgi?id=905100
https://bugzilla.opensuse.org/show_bug.cgi?id=905744
https://bugzilla.opensuse.org/show_bug.cgi?id=907818
https://bugzilla.opensuse.org/show_bug.cgi?id=908163
https://bugzilla.opensuse.org/show_bug.cgi?id=909077
https://bugzilla.opensuse.org/show_bug.cgi?id=910251

Solution :

Update the affected the Linux Kernel packages.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
Public Exploit Available : true