You are here
Home > Preporuke > Sigurnosni nedostaci u jezgri operacijskog sustava

Sigurnosni nedostaci u jezgri operacijskog sustava

openSUSE Security Update: kernel: security and bugfix release
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:0856-1
Rating: important
References: #869563 #870173 #870576 #871561 #873374 #876102
#878274 #880892
Cross-References: CVE-2013-7339 CVE-2014-0055 CVE-2014-0077
CVE-2014-2678 CVE-2014-2851 CVE-2014-3122
CVE-2014-3153
Affected Products:
openSUSE 12.3
______________________________________________________________________________

An update that solves 7 vulnerabilities and has one errata
is now available.

Description:

The Linux kernel was updated to fix security issues and bugs:

Security issues fixed: CVE-2014-3153: The futex_requeue function in
kernel/futex.c in the Linux kernel did not ensure that calls have two
different futex addresses, which allowed local users to gain privileges
via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter
modification.

CVE-2014-0077: drivers/vhost/net.c in the Linux kernel, when mergeable
buffers are disabled, did not properly validate packet lengths, which
allowed guest OS users to cause a denial of service (memory corruption and
host OS crash) or possibly gain privileges on the host OS via crafted
packets, related to the handle_rx and get_rx_bufs functions.

CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the
vhost-net subsystem in the Linux kernel package did not properly handle
vhost_get_vq_desc errors, which allowed guest OS users to cause a denial
of service (host OS crash) via unspecified vectors.

CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in the
Linux kernel allowed local users to cause a denial of service (NULL
pointer dereference and system crash) or possibly have unspecified other
impact via a bind system call for an RDS socket on a system that lacks RDS
transports.

CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the
Linux kernel allowed local users to cause a denial of service (NULL
pointer dereference and system crash) or possibly have unspecified other
impact via a bind system call for an RDS socket on a system that lacks RDS
transports.

CVE-2014-2851: Integer overflow in the ping_init_sock function in
net/ipv4/ping.c in the Linux kernel allowed local users to cause a denial
of service (use-after-free and system crash) or possibly gain privileges
via a crafted application that leverages an improperly managed reference
counter.

CVE-2014-3122: The try_to_unmap_cluster function in mm/rmap.c in the Linux
kernel did not properly consider which pages must be locked, which allowed
local users to cause a denial of service (system crash) by triggering a
memory-usage pattern that requires removal of page-table mappings.

Bugs fixed:
– memcg: deprecate memory.force_empty knob (bnc#878274).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE 12.3:

zypper in -t patch openSUSE-2014-451

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE 12.3 (i586 x86_64):

kernel-default-3.7.10-1.36.1
kernel-default-base-3.7.10-1.36.1
kernel-default-base-debuginfo-3.7.10-1.36.1
kernel-default-debuginfo-3.7.10-1.36.1
kernel-default-debugsource-3.7.10-1.36.1
kernel-default-devel-3.7.10-1.36.1
kernel-default-devel-debuginfo-3.7.10-1.36.1
kernel-syms-3.7.10-1.36.1

– openSUSE 12.3 (i686 x86_64):

kernel-debug-3.7.10-1.36.1
kernel-debug-base-3.7.10-1.36.1
kernel-debug-base-debuginfo-3.7.10-1.36.1
kernel-debug-debuginfo-3.7.10-1.36.1
kernel-debug-debugsource-3.7.10-1.36.1
kernel-debug-devel-3.7.10-1.36.1
kernel-debug-devel-debuginfo-3.7.10-1.36.1
kernel-desktop-3.7.10-1.36.1
kernel-desktop-base-3.7.10-1.36.1
kernel-desktop-base-debuginfo-3.7.10-1.36.1
kernel-desktop-debuginfo-3.7.10-1.36.1
kernel-desktop-debugsource-3.7.10-1.36.1
kernel-desktop-devel-3.7.10-1.36.1
kernel-desktop-devel-debuginfo-3.7.10-1.36.1
kernel-ec2-3.7.10-1.36.1
kernel-ec2-base-3.7.10-1.36.1
kernel-ec2-base-debuginfo-3.7.10-1.36.1
kernel-ec2-debuginfo-3.7.10-1.36.1
kernel-ec2-debugsource-3.7.10-1.36.1
kernel-ec2-devel-3.7.10-1.36.1
kernel-ec2-devel-debuginfo-3.7.10-1.36.1
kernel-trace-3.7.10-1.36.1
kernel-trace-base-3.7.10-1.36.1
kernel-trace-base-debuginfo-3.7.10-1.36.1
kernel-trace-debuginfo-3.7.10-1.36.1
kernel-trace-debugsource-3.7.10-1.36.1
kernel-trace-devel-3.7.10-1.36.1
kernel-trace-devel-debuginfo-3.7.10-1.36.1
kernel-vanilla-3.7.10-1.36.1
kernel-vanilla-debuginfo-3.7.10-1.36.1
kernel-vanilla-debugsource-3.7.10-1.36.1
kernel-vanilla-devel-3.7.10-1.36.1
kernel-vanilla-devel-debuginfo-3.7.10-1.36.1
kernel-xen-3.7.10-1.36.1
kernel-xen-base-3.7.10-1.36.1
kernel-xen-base-debuginfo-3.7.10-1.36.1
kernel-xen-debuginfo-3.7.10-1.36.1
kernel-xen-debugsource-3.7.10-1.36.1
kernel-xen-devel-3.7.10-1.36.1
kernel-xen-devel-debuginfo-3.7.10-1.36.1

– openSUSE 12.3 (noarch):

kernel-devel-3.7.10-1.36.1
kernel-docs-3.7.10-1.36.2
kernel-source-3.7.10-1.36.1
kernel-source-vanilla-3.7.10-1.36.1

– openSUSE 12.3 (i686):

kernel-pae-3.7.10-1.36.1
kernel-pae-base-3.7.10-1.36.1
kernel-pae-base-debuginfo-3.7.10-1.36.1
kernel-pae-debuginfo-3.7.10-1.36.1
kernel-pae-debugsource-3.7.10-1.36.1
kernel-pae-devel-3.7.10-1.36.1
kernel-pae-devel-debuginfo-3.7.10-1.36.1

References:

http://support.novell.com/security/cve/CVE-2013-7339.html
http://support.novell.com/security/cve/CVE-2014-0055.html
http://support.novell.com/security/cve/CVE-2014-0077.html
http://support.novell.com/security/cve/CVE-2014-2678.html
http://support.novell.com/security/cve/CVE-2014-2851.html
http://support.novell.com/security/cve/CVE-2014-3122.html
http://support.novell.com/security/cve/CVE-2014-3153.html
https://bugzilla.novell.com/869563
https://bugzilla.novell.com/870173
https://bugzilla.novell.com/870576
https://bugzilla.novell.com/871561
https://bugzilla.novell.com/873374
https://bugzilla.novell.com/876102
https://bugzilla.novell.com/878274
https://bugzilla.novell.com/880892


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa kdelibs

Otkriven je sigurnosni nedostatak u programskom paketu kdelibs za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje "man-in-the-middle" napada...

Close