SuSE 11.3 Security Update : Linux kernel (SAT Patch Numbers 8823 / 8827)

high Nessus Plugin ID 72325

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to 3.0.101 and also includes various other bug and security fixes.

A new feature was added :

- supported.conf: marked net/netfilter/xt_set as supported (bnc#851066)(fate#313309) The following security bugs have been fixed :

- Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. (bnc#853050).
(CVE-2013-4587)

- Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. (bnc#851101).
(CVE-2013-4592)

- The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via crafted modifications of the TMICT value. (bnc#853051).
(CVE-2013-6367)

- The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address. (bnc#853052).
(CVE-2013-6368)

- The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. (bnc#853053).
(CVE-2013-6376)

- The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application. (bnc#848321). (CVE-2013-4483)

- Multiple integer overflows in Alchemy LCD frame-buffer drivers in the Linux kernel before 3.12 allow local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted mmap operations, related to the (1) au1100fb_fb_mmap function in drivers/video/au1100fb.c and the (2) au1200fb_fb_mmap function in drivers/video/au1200fb.c. (bnc#849021).
(CVE-2013-4511)

- Multiple buffer overflows in drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel before 3.12 allow local users to cause a denial of service or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability and providing a long station-name string, related to the (1) wvlan_uil_put_info and (2) wvlan_set_station_nickname functions. (bnc#849029). (CVE-2013-4514)

- The bcm_char_ioctl function in drivers/staging/bcm/Bcmchar.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an IOCTL_BCM_GET_DEVICE_DRIVER_INFO ioctl call. (bnc#849034). (CVE-2013-4515)

- The lbs_debugfs_write function in drivers/net/wireless/libertas/debugfs.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service (OOPS) by leveraging root privileges for a zero-length write operation. (bnc#852559).
(CVE-2013-6378)

- The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that triggers a crafted SRB command.
(bnc#852373). (CVE-2013-6380)

- The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header. (bnc#854634). (CVE-2013-7027)

- Linux kernel built with the networking support(CONFIG_NET) is vulnerable to an information leakage flaw in the socket layer. It could occur while doing recvmsg(2), recvfrom(2) socket calls. It occurs due to improperly initialised msg_name & msg_namelen message header parameters. (bnc#854722). (CVE-2013-6463)

- The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call. (bnc#852558).
(CVE-2013-6383)

- Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.
(bnc#840226). (CVE-2013-4345)

- arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel before 3.8.9, when the Performance Events Subsystem is enabled, specifies an incorrect bitmask, which allows local users to cause a denial of service (general protection fault and system crash) by attempting to set a reserved bit. (bnc#825006).
(CVE-2013-2146)

- The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in the Linux kernel before 3.12.2 does not properly restrict access to the perf subsystem, which allows local users to enable function tracing via a crafted application.
(bnc#849362). (CVE-2013-2930)

Also the following non-security bugs have been fixed :

- kernel: correct tlb flush on page table upgrade (bnc#847660, LTC#99268).

- kernel: fix floating-point-control register save and restore (bnc#847660, LTC#99000).

- kernel: correct handling of asce-type exceptions (bnc#851879, LTC#100293).

- watchdog: Get rid of MODULE_ALIAS_MISCDEV statements.
(bnc#827767)

- random: fix accounting race condition with lockless irq entropy_count update. (bnc#789359)

- blktrace: Send BLK_TN_PROCESS events to all running traces. (bnc#838623)

- printk: forcibly flush nmi ringbuffer if oops is in progress. (bnc#849675)

- Introduce KABI exception for cpuidle_state->disable via #ifndef __GENKSYMS__

- Honor state disabling in the cpuidle ladder governor.
(bnc#845378)

- cpuidle: add a sysfs entry to disable specific C state for debug purpose. (bnc#845378)

- net: Do not enable tx-nocache-copy by default.
(bnc#845378)

- mm: reschedule to avoid RCU stall triggering during boot of large machines. (bnc#820434,bnc#852153)

- rtc-cmos: Add an alarm disable quirk. (bnc#805740)

- tty/hvc_iucv: Disconnect IUCV connection when lowering DTR (bnc#839973, LTC#97595).

- tty/hvc_console: Add DTR/RTS callback to handle HUPCL control (bnc#839973, LTC#97595).

- sched: Avoid throttle_cfs_rq() racing with period_timer stopping. (bnc#848336)

- sched/balancing: Periodically decay max cost of idle balance. (bnc#849256)

- sched: Consider max cost of idle balance per sched domain. (bnc#849256)

- sched: Reduce overestimating rq->avg_idle. (bnc#849256)

- sched: Fix cfs_bandwidth misuse of hrtimer_expires_remaining. (bnc#848336)

- sched: Fix hrtimer_cancel()/rq->lock deadlock.
(bnc#848336)

- sched: Fix race on toggling cfs_bandwidth_used.
(bnc#848336)

- sched: Guarantee new group-entities always have weight.
(bnc#848336)

- sched: Use jump labels to reduce overhead when bandwidth control is inactive. (bnc#848336)

- sched: Fix several races in CFS_BANDWIDTH. (bnc#848336)

- futex: fix handling of read-only-mapped hugepages (VM Functionality).

- futex: move user address verification up to common code.
(bnc#851603)

- futexes: Clean up various details. (bnc#851603)

- futexes: Increase hash table size for better performance. (bnc#851603)

- futexes: Document multiprocessor ordering guarantees.
(bnc#851603)

- futexes: Avoid taking the hb->lock if there is nothing to wake up. (bnc#851603)

- futexes: Fix futex_hashsize initialization. (bnc#851603)

- mutex: Make more scalable by doing fewer atomic operations. (bnc#849256)

- powerpc: Fix memory hotplug with sparse vmemmap.
(bnc#827527)

- powerpc: Add System RAM to /proc/iomem. (bnc#827527)

- powerpc/mm: Mark Memory Resources as busy. (bnc#827527)

- powerpc: Fix fatal SLB miss when restoring PPR.
(bnc#853465)

- powerpc: Make function that parses RTAS error logs global. (bnc#852761)

- powerpc/pseries: Parse and handle EPOW interrupts.
(bnc#852761)

- powerpc/rtas_flash: Fix validate_flash buffer overflow issue. (bnc#847842)

- powerpc/rtas_flash: Fix bad memory access. (bnc#847842)

- x86: Update UV3 hub revision ID (bnc#846298 fate#314987).

- x86: Remove some noise from boot log when starting cpus.
(bnc#770541)

- x86/microcode/amd: Tone down printk(), do not treat a missing firmware file as an error. (bnc#843654)

- x86/dumpstack: Fix printk_address for direct addresses.
(bnc#845621)

- x86/PCI: reduce severity of host bridge window conflict warnings. (bnc#858534)

- ipv6: fix race condition regarding dst->expires and dst->from. (bnc#843185)

- netback: bump tx queue length. (bnc#849404)

- xfrm: invalidate dst on policy insertion/deletion.
(bnc#842239)

- xfrm: prevent ipcomp scratch buffer race condition.
(bnc#842239)

- tcp: bind() fix autoselection to share ports.
(bnc#823618)

- tcp: bind() use stronger condition for bind_conflict.
(bnc#823618)

- tcp: ipv6: bind() use stronger condition for bind_conflict. (bnc#823618)

- kabi: protect bind_conflict callback in struct inet_connection_sock_af_ops. (bnc#823618)

- macvlan: introduce IFF_MACVLAN flag and helper function.
(bnc#846984)

- macvlan: introduce macvlan_dev_real_dev() helper function. (bnc#846984)

- macvlan: disable LRO on lower device instead of macvlan.
(bnc#846984)

- fs: Avoid softlockup in shrink_dcache_for_umount_subtree. (bnc#834473)

- blkdev_max_block: make private to fs/buffer.c.
(bnc#820338)

- storage: SMI Corporation usb key added to READ_CAPACITY_10 quirk. (bnc#850324)

- autofs4: autofs4_wait() vs. autofs4_catatonic_mode() race. (bnc#851314)

- autofs4: catatonic_mode vs. notify_daemon race.
(bnc#851314)

- autofs4: close the races around autofs4_notify_daemon().
(bnc#851314)

- autofs4: deal with autofs4_write/autofs4_write races.
(bnc#851314)

- autofs4: dont clear DCACHE_NEED_AUTOMOUNT on rootless mount. (bnc#851314)

- autofs4: fix deal with autofs4_write races. (bnc#851314)

- autofs4: use simple_empty() for empty directory check.
(bnc#851314)

- dlm: set zero linger time on sctp socket. (bnc#787843)

- SUNRPC: Fix a data corruption issue when retransmitting RPC calls (no bugzilla yet - netapp confirms problem and fix).

- nfs: Change NFSv4 to not recover locks after they are lost. (bnc#828236)

- nfs: Adapt readdirplus to application usage patterns.
(bnc#834708)

- xfs: Account log unmount transaction correctly.
(bnc#849950)

- xfs: improve ioend error handling. (bnc#846036)

- xfs: reduce ioend latency. (bnc#846036)

- xfs: use per-filesystem I/O completion workqueues.
(bnc#846036)

- xfs: Hide additional entries in struct xfs_mount.
(bnc#846036 / bnc#848544)

- Btrfs: do not BUG_ON() if we get an error walking backrefs (FATE#312888).

- vfs: avoid 'attempt to access beyond end of device' warnings. (bnc#820338)

- vfs: fix O_DIRECT read past end of block device.
(bnc#820338)

- cifs: Improve performance of browsing directories with several files. (bnc#810323)

- cifs: Ensure cifs directories do not show up as files.
(bnc#826602)

- dm-multipath: abort all requests when failing a path.
(bnc#798050)

- scsi: Add 'eh_deadline' to limit SCSI EH runtime.
(bnc#798050)

- scsi: Allow error handling timeout to be specified.
(bnc#798050)

- scsi: Fixup compilation warning. (bnc#798050)

- scsi: Retry failfast commands after EH. (bnc#798050)

- scsi: Warn on invalid command completion. (bnc#798050)

- advansys: Remove 'last_reset' references. (bnc#798050)

- cleanup setting task state in scsi_error_handler().
(bnc#798050)

- dc395: Move 'last_reset' into internal host structure.
(bnc#798050)

- dpt_i2o: Remove DPTI_STATE_IOCTL. (bnc#798050)

- dpt_i2o: return SCSI_MLQUEUE_HOST_BUSY when in reset.
(bnc#798050)

- scsi: kABI fixes. (bnc#798050)

- scsi: remove check for 'resetting'. (bnc#798050)

- tmscsim: Move 'last_reset' into host structure.
(bnc#798050)

- SCSI & usb-storage: add try_rc_10_first flag.
(bnc#853428)

- iscsi_target: race condition on shutdown. (bnc#850072)

- libfcoe: Make fcoe_sysfs optional / fix fnic NULL exception. (bnc#837206)

- lpfc 8.3.42: Fixed issue of task management commands having a fixed timeout. (bnc#856481)

- advansys: Remove 'last_reset' references. (bnc#856481)

- dc395: Move 'last_reset' into internal host structure.
(bnc#856481)

- Add 'eh_deadline' to limit SCSI EH runtime. (bnc#856481)

- remove check for 'resetting'. (bnc#856481)

- tmscsim: Move 'last_reset' into host structure.
(bnc#856481)

- scsi_dh_rdac: Add new IBM 1813 product id to rdac devlist. (bnc#846654)

- md: Change handling of save_raid_disk and metadata update during recovery. (bnc#849364)

- dpt_i2o: Remove DPTI_STATE_IOCTL. (bnc#856481)

- dpt_i2o: return SCSI_MLQUEUE_HOST_BUSY when in reset.
(bnc#856481)

- crypto: unload of aes_s390 module causes kernel panic (bnc#847660, LTC#98706).

- crypto: Fix aes-xts parameter corruption (bnc#854546, LTC#100718).

- crypto: gf128mul - fix call to memset() (obvious fix).

- X.509: Fix certificate gathering. (bnc#805114)

- pcifront: Deal with toolstack missing 'XenbusStateClosing' state.

- xencons: generalize use of add_preferred_console().
(bnc#733022, bnc#852652)

- netxen: fix off by one bug in netxen_release_tx_buffer(). (bnc#845729)

- xen: xen_spin_kick fixed crash/lock release (bnc#807434)(bnc#848652).

- xen: fixed USB passthrough issue. (bnc#852624)

- igb: Fix get_fw_version function for all parts.
(bnc#848317)

- igb: Refactor of init_nvm_params. (bnc#848317)

- r8169: check ALDPS bit and disable it if enabled for the 8168g. (bnc#845352)

- qeth: request length checking in snmp ioctl (bnc#847660, LTC#99511).

- bnx2x: remove false warning regarding interrupt number.
(bnc#769035)

- usb: Fix xHCI host issues on remote wakeup. (bnc#846989)

- xhci: Limit the spurious wakeup fix only to HP machines.
(bnc#833097)

- Intel xhci: refactor EHCI/xHCI port switching.
(bnc#840116)

- xhci-hub.c: preserved kABI. (bnc#840116)

- xhci: Refactor port status into a new function.
(bnc#840116)

- HID: multitouch: Add support for NextWindow 0340 touchscreen. (bnc#849855)

- HID: multitouch: Add support for Qaunta 3027 touchscreen. (bnc#854516)

- HID: multitouch: add support for Atmel 212c touchscreen.
(bnc#793727)

- HID: multitouch: partial support of win8 devices.
(bnc#854516,bnc#793727,bnc#849855)

- HID: hid-multitouch: add support for the IDEACOM 6650 chip. (bnc#854516,bnc#793727,bnc#849855)

- ALSA: hda - Fix inconsistent mic-mute LED. (bnc#848864)

- ALSA: hda - load EQ params into IDT codec on HP bNB13 systems. (bnc#850493)

- lpfc: correct some issues with txcomplq processing.
(bnc#818064)

- lpfc: correct an issue with rrq processing. (bnc#818064)

- block: factor out vector mergeable decision to a helper function. (bnc#769644)

- block: modify __bio_add_page check to accept pages that do not start a new segment. (bnc#769644)

- sd: avoid deadlocks when running under multipath.
(bnc#818545)

- sd: fix crash when UA received on DIF enabled device.
(bnc#841445)

- sg: fix blk_get_queue usage. (bnc#834808)

- lpfc: Do not free original IOCB whenever ABTS fails.
(bnc#806988)

- lpfc: Fix kernel warning on spinlock usage. (bnc#806988)

- lpfc: Fixed system panic due to midlayer abort.
(bnc#806988)

- qla2xxx: Add module parameter to override the default request queue size. (bnc#826756)

- qla2xxx: Module parameter 'ql2xasynclogin'. (bnc#825896)

- Pragmatic workaround for realtime class abuse induced latency issues.

- Provide realtime priority kthread and workqueue boot options. (bnc#836718)

- mlx4: allocate just enough pages instead of always 4 pages. (bnc#835186 / bnc#835074)

- mlx4: allow order-0 memory allocations in RX path.
(bnc#835186 / bnc#835074)

- net/mlx4: use one page fragment per incoming frame.
(bnc#835186 / bnc#835074)

- bna: do not register ndo_set_rx_mode callback.
(bnc#847261)

- PCI: pciehp: Retrieve link speed after link is trained.
(bnc#820102)

- PCI: Separate pci_bus_read_dev_vendor_id from pci_scan_device. (bnc#820102)

- PCI: pciehp: replace unconditional sleep with config space access check. (bnc#820102)

- PCI: pciehp: make check_link_active more helpful.
(bnc#820102)

- PCI: pciehp: Add pcie_wait_link_not_active().
(bnc#820102)

- PCI: pciehp: Add Disable/enable link functions.
(bnc#820102)

- PCI: pciehp: Disable/enable link during slot power off/on. (bnc#820102)

- PCI: fix truncation of resource size to 32 bits.
(bnc#843419)

- hv: handle more than just WS2008 in KVP negotiation.
(bnc#850640)

- mei: ME hardware reset needs to be synchronized.
(bnc#821619)

- kabi: Restore struct irq_desc::timer_rand_state.

- fs3270: unloading module does not remove device (bnc#851879, LTC#100284).

- cio: add message for timeouts on internal I/O (bnc#837739,LTC#97047).

- isci: Fix a race condition in the SSP task management path. (bnc#826978)

- ptp: dynamic allocation of PHC char devices.
(bnc#851290)

- efifb: prevent null-deref when iterating dmi_list.
(bnc#848055)

- dm-mpath: Fixup race condition in activate_path().
(bnc#708296)

- dm-mpath: do not detach stale hardware handler.
(bnc#708296)

- dm-multipath: Improve logging. (bnc#708296)

- scsi_dh: invoke callback if ->activate is not present.
(bnc#708296)

- scsi_dh: return individual errors in scsi_dh_activate().
(bnc#708296)

- scsi_dh_alua: Decode EMC Clariion extended inquiry.
(bnc#708296)

- scsi_dh_alua: Decode HP EVA array identifier.
(bnc#708296)

- scsi_dh_alua: Evaluate state for all port groups.
(bnc#708296)

- scsi_dh_alua: Fix missing close brace in alua_check_sense. (bnc#843642)

- scsi_dh_alua: Make stpg synchronous. (bnc#708296)

- scsi_dh_alua: Pass buffer as function argument.
(bnc#708296)

- scsi_dh_alua: Re-evaluate port group states after STPG.
(bnc#708296)

- scsi_dh_alua: Recheck state on transitioning.
(bnc#708296)

- scsi_dh_alua: Rework rtpg workqueue. (bnc#708296)

- scsi_dh_alua: Use separate alua_port_group structure.
(bnc#708296)

- scsi_dh_alua: Allow get_alua_data() to return NULL.
(bnc#839407)

- scsi_dh_alua: asynchronous RTPG. (bnc#708296)

- scsi_dh_alua: correctly terminate target port strings.
(bnc#708296)

- scsi_dh_alua: defer I/O while workqueue item is pending.
(bnc#708296)

- scsi_dh_alua: Do not attach to RAID or enclosure devices. (bnc#819979)

- scsi_dh_alua: Do not attach to well-known LUNs.
(bnc#821980)

- scsi_dh_alua: fine-grained locking in alua_rtpg_work().
(bnc#708296)

- scsi_dh_alua: invalid state information for 'optimized' paths. (bnc#843445)

- scsi_dh_alua: move RTPG to workqueue. (bnc#708296)

- scsi_dh_alua: move 'expiry' into PG structure.
(bnc#708296)

- scsi_dh_alua: move some sense code handling into generic code. (bnc#813245)

- scsi_dh_alua: multipath failover fails with error 15.
(bnc#825696)

- scsi_dh_alua: parse target device id. (bnc#708296)

- scsi_dh_alua: protect accesses to struct alua_port_group. (bnc#708296)

- scsi_dh_alua: put sense buffer on stack. (bnc#708296)

- scsi_dh_alua: reattaching device handler fails with 'Error 15'. (bnc#843429)

- scsi_dh_alua: remove locking when checking state.
(bnc#708296)

- scsi_dh_alua: remove stale variable. (bnc#708296)

- scsi_dh_alua: retry RTPG on UNIT ATTENTION. (bnc#708296)

- scsi_dh_alua: retry command on 'mode parameter changed' sense code. (bnc#843645)

- scsi_dh_alua: simplify alua_check_sense(). (bnc#843642)

- scsi_dh_alua: simplify state update. (bnc#708296)

- scsi_dh_alua: use delayed_work. (bnc#708296)

- scsi_dh_alua: use flag for RTPG extended header.
(bnc#708296)

- scsi_dh_alua: use local buffer for VPD inquiry.
(bnc#708296)

- scsi_dh_alua: use spin_lock_irqsave for port group.
(bnc#708296)

- scsi_dh_alua: defer I/O while workqueue item is pending.
(bnc#708296)

- scsi_dh_alua: Rework rtpg workqueue. (bnc#708296)

- scsi_dh_alua: use delayed_work. (bnc#708296)

- scsi_dh_alua: move 'expiry' into PG structure.
(bnc#708296)

- scsi_dh: invoke callback if ->activate is not present.
(bnc#708296)

- scsi_dh_alua: correctly terminate target port strings.
(bnc#708296)

- scsi_dh_alua: retry RTPG on UNIT ATTENTION. (bnc#708296)

- scsi_dh_alua: protect accesses to struct alua_port_group. (bnc#708296)

- scsi_dh_alua: fine-grained locking in alua_rtpg_work().
(bnc#708296)

- scsi_dh_alua: use spin_lock_irqsave for port group.
(bnc#708296)

- scsi_dh_alua: remove locking when checking state.
(bnc#708296)

- scsi_dh_alua: remove stale variable. (bnc#708296)

- scsi_dh: return individual errors in scsi_dh_activate().
(bnc#708296)

- scsi_dh_alua: fixup misplaced brace in alua_initialize(). (bnc#858831)

- drm/i915: add I915_PARAM_HAS_VEBOX to i915_getparam (bnc#831103,FATE#316109).

- drm/i915: add I915_EXEC_VEBOX to i915_gem_do_execbuffer() (bnc#831103,FATE#316109).

- drm/i915: add VEBOX into debugfs (bnc#831103,FATE#316109).

- drm/i915: Enable vebox interrupts (bnc#831103,FATE#316109).

- drm/i915: vebox interrupt get/put (bnc#831103,FATE#316109).

- drm/i915: consolidate interrupt naming scheme (bnc#831103,FATE#316109).

- drm/i915: Convert irq_refounct to struct (bnc#831103,FATE#316109).

- drm/i915: make PM interrupt writes non-destructive (bnc#831103,FATE#316109).

- drm/i915: Add PM regs to pre/post install (bnc#831103,FATE#316109).

- drm/i915: Create an ivybridge_irq_preinstall (bnc#831103,FATE#316109).

- drm/i915: Create a more generic pm handler for hsw+ (bnc#831103,FATE#316109).

- drm/i915: Vebox ringbuffer init (bnc#831103,FATE#316109).

- drm/i915: add HAS_VEBOX (bnc#831103,FATE#316109).

- drm/i915: Rename ring flush functions (bnc#831103,FATE#316109).

- drm/i915: Add VECS semaphore bits (bnc#831103,FATE#316109).

- drm/i915: Introduce VECS: the 4th ring (bnc#831103,FATE#316109).

- drm/i915: Semaphore MBOX update generalization (bnc#831103,FATE#316109).

- drm/i915: Comments for semaphore clarification (bnc#831103,FATE#316109).

- drm/i915: fix gen4 digital port hotplug definitions.
(bnc#850103)

- drm/mgag200: Bug fix: Modified pll algorithm for EH project. (bnc#841654)

- drm: do not add inferred modes for monitors that do not support them. (bnc#849809)

- s390/cio: dont abort verification after missing irq (bnc#837739,LTC#97047).

- s390/cio: skip broken paths (bnc#837739,LTC#97047).

- s390/cio: export vpm via sysfs (bnc#837739,LTC#97047).

- s390/cio: handle unknown pgroup state (bnc#837739,LTC#97047).

Solution

Apply SAT patch number 8823 / 8827 as appropriate.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=708296

https://bugzilla.novell.com/show_bug.cgi?id=733022

https://bugzilla.novell.com/show_bug.cgi?id=769035

https://bugzilla.novell.com/show_bug.cgi?id=769644

https://bugzilla.novell.com/show_bug.cgi?id=770541

https://bugzilla.novell.com/show_bug.cgi?id=787843

https://bugzilla.novell.com/show_bug.cgi?id=789359

https://bugzilla.novell.com/show_bug.cgi?id=793727

https://bugzilla.novell.com/show_bug.cgi?id=798050

https://bugzilla.novell.com/show_bug.cgi?id=805114

https://bugzilla.novell.com/show_bug.cgi?id=805740

https://bugzilla.novell.com/show_bug.cgi?id=848335

https://bugzilla.novell.com/show_bug.cgi?id=848336

https://bugzilla.novell.com/show_bug.cgi?id=848544

https://bugzilla.novell.com/show_bug.cgi?id=848652

https://bugzilla.novell.com/show_bug.cgi?id=848864

https://bugzilla.novell.com/show_bug.cgi?id=849021

https://bugzilla.novell.com/show_bug.cgi?id=849029

https://bugzilla.novell.com/show_bug.cgi?id=849034

https://bugzilla.novell.com/show_bug.cgi?id=849256

https://bugzilla.novell.com/show_bug.cgi?id=849362

https://bugzilla.novell.com/show_bug.cgi?id=849364

https://bugzilla.novell.com/show_bug.cgi?id=849404

https://bugzilla.novell.com/show_bug.cgi?id=849675

https://bugzilla.novell.com/show_bug.cgi?id=849809

https://bugzilla.novell.com/show_bug.cgi?id=849855

https://bugzilla.novell.com/show_bug.cgi?id=849950

https://bugzilla.novell.com/show_bug.cgi?id=850072

https://bugzilla.novell.com/show_bug.cgi?id=850103

https://bugzilla.novell.com/show_bug.cgi?id=850324

https://bugzilla.novell.com/show_bug.cgi?id=850493

https://bugzilla.novell.com/show_bug.cgi?id=850640

https://bugzilla.novell.com/show_bug.cgi?id=851066

https://bugzilla.novell.com/show_bug.cgi?id=851101

https://bugzilla.novell.com/show_bug.cgi?id=851290

https://bugzilla.novell.com/show_bug.cgi?id=851314

https://bugzilla.novell.com/show_bug.cgi?id=851603

https://bugzilla.novell.com/show_bug.cgi?id=851879

https://bugzilla.novell.com/show_bug.cgi?id=852153

https://bugzilla.novell.com/show_bug.cgi?id=852373

https://bugzilla.novell.com/show_bug.cgi?id=852558

https://bugzilla.novell.com/show_bug.cgi?id=852559

https://bugzilla.novell.com/show_bug.cgi?id=852624

https://bugzilla.novell.com/show_bug.cgi?id=852652

https://bugzilla.novell.com/show_bug.cgi?id=852761

https://bugzilla.novell.com/show_bug.cgi?id=853050

https://bugzilla.novell.com/show_bug.cgi?id=853051

https://bugzilla.novell.com/show_bug.cgi?id=853052

https://bugzilla.novell.com/show_bug.cgi?id=853053

https://bugzilla.novell.com/show_bug.cgi?id=853428

https://bugzilla.novell.com/show_bug.cgi?id=853465

https://bugzilla.novell.com/show_bug.cgi?id=854516

https://bugzilla.novell.com/show_bug.cgi?id=854546

https://bugzilla.novell.com/show_bug.cgi?id=854634

https://bugzilla.novell.com/show_bug.cgi?id=854722

https://bugzilla.novell.com/show_bug.cgi?id=856307

https://bugzilla.novell.com/show_bug.cgi?id=856481

https://bugzilla.novell.com/show_bug.cgi?id=858534

https://bugzilla.novell.com/show_bug.cgi?id=858831

http://support.novell.com/security/cve/CVE-2013-2146.html

http://support.novell.com/security/cve/CVE-2013-2930.html

http://support.novell.com/security/cve/CVE-2013-4345.html

http://support.novell.com/security/cve/CVE-2013-4483.html

http://support.novell.com/security/cve/CVE-2013-4511.html

http://support.novell.com/security/cve/CVE-2013-4514.html

http://support.novell.com/security/cve/CVE-2013-4515.html

http://support.novell.com/security/cve/CVE-2013-4587.html

http://support.novell.com/security/cve/CVE-2013-4592.html

http://support.novell.com/security/cve/CVE-2013-6367.html

http://support.novell.com/security/cve/CVE-2013-6368.html

http://support.novell.com/security/cve/CVE-2013-6376.html

http://support.novell.com/security/cve/CVE-2013-6378.html

http://support.novell.com/security/cve/CVE-2013-6380.html

http://support.novell.com/security/cve/CVE-2013-6383.html

http://support.novell.com/security/cve/CVE-2013-6463.html

http://support.novell.com/security/cve/CVE-2013-7027.html

https://bugzilla.novell.com/show_bug.cgi?id=806988

https://bugzilla.novell.com/show_bug.cgi?id=807434

https://bugzilla.novell.com/show_bug.cgi?id=810323

https://bugzilla.novell.com/show_bug.cgi?id=813245

https://bugzilla.novell.com/show_bug.cgi?id=818064

https://bugzilla.novell.com/show_bug.cgi?id=818545

https://bugzilla.novell.com/show_bug.cgi?id=819979

https://bugzilla.novell.com/show_bug.cgi?id=820102

https://bugzilla.novell.com/show_bug.cgi?id=820338

https://bugzilla.novell.com/show_bug.cgi?id=820434

https://bugzilla.novell.com/show_bug.cgi?id=821619

https://bugzilla.novell.com/show_bug.cgi?id=821980

https://bugzilla.novell.com/show_bug.cgi?id=823618

https://bugzilla.novell.com/show_bug.cgi?id=825006

https://bugzilla.novell.com/show_bug.cgi?id=825696

https://bugzilla.novell.com/show_bug.cgi?id=825896

https://bugzilla.novell.com/show_bug.cgi?id=826602

https://bugzilla.novell.com/show_bug.cgi?id=826756

https://bugzilla.novell.com/show_bug.cgi?id=826978

https://bugzilla.novell.com/show_bug.cgi?id=827527

https://bugzilla.novell.com/show_bug.cgi?id=827767

https://bugzilla.novell.com/show_bug.cgi?id=828236

https://bugzilla.novell.com/show_bug.cgi?id=831103

https://bugzilla.novell.com/show_bug.cgi?id=833097

https://bugzilla.novell.com/show_bug.cgi?id=834473

https://bugzilla.novell.com/show_bug.cgi?id=834708

https://bugzilla.novell.com/show_bug.cgi?id=834808

https://bugzilla.novell.com/show_bug.cgi?id=835074

https://bugzilla.novell.com/show_bug.cgi?id=835186

https://bugzilla.novell.com/show_bug.cgi?id=836718

https://bugzilla.novell.com/show_bug.cgi?id=837206

https://bugzilla.novell.com/show_bug.cgi?id=837739

https://bugzilla.novell.com/show_bug.cgi?id=838623

https://bugzilla.novell.com/show_bug.cgi?id=839407

https://bugzilla.novell.com/show_bug.cgi?id=839973

https://bugzilla.novell.com/show_bug.cgi?id=840116

https://bugzilla.novell.com/show_bug.cgi?id=840226

https://bugzilla.novell.com/show_bug.cgi?id=841445

https://bugzilla.novell.com/show_bug.cgi?id=841654

https://bugzilla.novell.com/show_bug.cgi?id=842239

https://bugzilla.novell.com/show_bug.cgi?id=843185

https://bugzilla.novell.com/show_bug.cgi?id=843419

https://bugzilla.novell.com/show_bug.cgi?id=843429

https://bugzilla.novell.com/show_bug.cgi?id=843445

https://bugzilla.novell.com/show_bug.cgi?id=843642

https://bugzilla.novell.com/show_bug.cgi?id=843645

https://bugzilla.novell.com/show_bug.cgi?id=843654

https://bugzilla.novell.com/show_bug.cgi?id=845352

https://bugzilla.novell.com/show_bug.cgi?id=845378

https://bugzilla.novell.com/show_bug.cgi?id=845621

https://bugzilla.novell.com/show_bug.cgi?id=845729

https://bugzilla.novell.com/show_bug.cgi?id=846036

https://bugzilla.novell.com/show_bug.cgi?id=846298

https://bugzilla.novell.com/show_bug.cgi?id=846654

https://bugzilla.novell.com/show_bug.cgi?id=846984

https://bugzilla.novell.com/show_bug.cgi?id=846989

https://bugzilla.novell.com/show_bug.cgi?id=847261

https://bugzilla.novell.com/show_bug.cgi?id=847660

https://bugzilla.novell.com/show_bug.cgi?id=847842

https://bugzilla.novell.com/show_bug.cgi?id=848055

https://bugzilla.novell.com/show_bug.cgi?id=848317

https://bugzilla.novell.com/show_bug.cgi?id=848321

Plugin Details

Severity: High

ID: 72325

File Name: suse_11_kernel-140125.nasl

Version: 1.4

Type: local

Agent: unix

Published: 2/5/2014

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:kernel-default-devel, p-cpe:/a:novell:suse_linux:11:kernel-default-extra, p-cpe:/a:novell:suse_linux:11:kernel-ec2, p-cpe:/a:novell:suse_linux:11:kernel-ec2-base, p-cpe:/a:novell:suse_linux:11:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:11:kernel-pae, p-cpe:/a:novell:suse_linux:11:kernel-pae-base, p-cpe:/a:novell:suse_linux:11:kernel-pae-devel, p-cpe:/a:novell:suse_linux:11:kernel-pae-extra, p-cpe:/a:novell:suse_linux:11:kernel-source, p-cpe:/a:novell:suse_linux:11:kernel-syms, p-cpe:/a:novell:suse_linux:11:kernel-trace, p-cpe:/a:novell:suse_linux:11:kernel-trace-base, p-cpe:/a:novell:suse_linux:11:kernel-trace-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen, p-cpe:/a:novell:suse_linux:11:kernel-xen-base, p-cpe:/a:novell:suse_linux:11:kernel-xen-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen-extra, p-cpe:/a:novell:suse_linux:11:xen-kmp-default, p-cpe:/a:novell:suse_linux:11:xen-kmp-pae, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 1/25/2014

Reference Information

CVE: CVE-2013-2146, CVE-2013-2930, CVE-2013-4345, CVE-2013-4483, CVE-2013-4511, CVE-2013-4514, CVE-2013-4515, CVE-2013-4587, CVE-2013-4592, CVE-2013-6367, CVE-2013-6368, CVE-2013-6376, CVE-2013-6378, CVE-2013-6380, CVE-2013-6383, CVE-2013-7027, CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, CVE-2013-7271