You are here
Home > Preporuke > Sigurnosni nedostaci jezgre operacijskog sustava

Sigurnosni nedostaci jezgre operacijskog sustava

openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:1641-1
Rating: important
References: #945345 #955654 #963762 #966245 #966849 #970506
#971126 #971799 #973570 #974308 #975945 #977198
#978073 #978401 #978821 #978822 #979018 #979213
#979278 #979548 #979728 #979867 #979879 #979913
#980348 #980371 #980657 #981058 #981267 #981344
#982238 #982239 #982712 #983143 #983213 #984460

Cross-References: CVE-2013-7446 CVE-2016-0758 CVE-2016-1583
CVE-2016-2053 CVE-2016-3134 CVE-2016-3672
CVE-2016-3955 CVE-2016-4482 CVE-2016-4485
CVE-2016-4486 CVE-2016-4557 CVE-2016-4565
CVE-2016-4569 CVE-2016-4578 CVE-2016-4580
CVE-2016-4581 CVE-2016-4805 CVE-2016-4951
CVE-2016-5244
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________

An update that solves 19 vulnerabilities and has 17 fixes
is now available.

Description:

The openSUSE Leap 42.1 kernel was updated to 4.1.26 to receive various
security and bugfixes.

The following security bugs were fixed:
– CVE-2016-1583: Prevent the usage of mmap when the lower file system does
not allow it. This could have lead to local privilege escalation when
ecryptfs-utils was installed and /sbin/mount.ecryptfs_private was setuid
(bsc#983143).
– CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel
incorrectly relies on the write system call, which allows local users to
cause a denial of service (kernel memory write operation) or possibly
have unspecified other impact via a uAPI interface. (bsc#979548)
– CVE-2016-4805: Use-after-free vulnerability in
drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to
cause a denial of service (memory corruption and system crash,
or spinlock) or possibly have unspecified other impact by removing a
network namespace, related to the ppp_register_net_channel and
ppp_unregister_channel functions. (bsc#980371).
– CVE-2016-4951: The tipc_nl_publ_dump function in net/tipc/socket.c in
the Linux kernel did not verify socket existence, which allowed local
users to cause a denial of service (NULL pointer dereference and system
crash) or possibly have unspecified other impact via a dumpit
operation. (bsc#981058).
– CVE-2016-5244: An information leak vulnerability in function
rds_inc_info_copy of file net/rds/recv.c was fixed that might have
leaked kernel stack data. (bsc#983213).
– CVE-2016-4580: The x25_negotiate_facilities function in
net/x25/x25_facilities.c in the Linux kernel did not properly initialize
a certain data structure, which allowed attackers to
obtain sensitive information from kernel stack memory via an X.25 Call
Request. (bsc#981267).
– CVE-2016-0758: Tags with indefinite length could have corrupted pointers
in asn1_find_indefinite_length (bsc#979867).
– CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in
the Linux kernel allowed attackers to cause a denial of service (panic)
via an ASN.1 BER file that lacks a public key, leading to mishandling by
the public_key_verify_signature function in
crypto/asymmetric_keys/public_key.c (bnc#963762).
– CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in the
Linux kernel allowed local users to bypass intended AF_UNIX socket
permissions or cause a denial of service (panic) via crafted epoll_ctl
calls (bnc#955654).
– CVE-2016-3134: The netfilter subsystem in the Linux kernel did not
validate certain offset fields, which allowed local users to gain
privileges or cause a denial of service (heap memory corruption) via an
IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
– CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c
in the Linux kernel did not properly randomize the legacy base address,
which made it easier for local users to defeat the intended restrictions
on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism
for a setuid or setgid program, by disabling stack-consumption resource
limits (bnc#974308).
– CVE-2016-4482: A kernel information leak in the usbfs devio connectinfo
was fixed, which could expose kernel stack memory to userspace.
(bnc#978401).
– CVE-2016-4485: A kernel information leak in llc was fixed (bsc#978821).
– CVE-2016-4486: A kernel information leak in rtnetlink was fixed, where 4
uninitialized bytes could leak to userspace (bsc#978822).
– CVE-2016-4557: A use-after-free via double-fdput in
replace_map_fd_with_map_ptr() was fixed, which could allow privilege
escalation (bsc#979018).
– CVE-2016-4565: When the “rdma_ucm” infiniband module is loaded, local
attackers could escalate their privileges (bsc#979548).
– CVE-2016-4569: A kernel information leak in the ALSA timer via events
via snd_timer_user_tinterrupt that could leak information to userspace
was fixed (bsc#979213).
– CVE-2016-4578: A kernel information leak in the ALSA timer via events
that could leak information to userspace was fixed (bsc#979879).
– CVE-2016-4581: If the first propogated mount copy was being a slave it
could oops the kernel (bsc#979913)

The following non-security bugs were fixed:
– ALSA: hda – Add dock support for ThinkPad X260 (boo#979278).
– ALSA: hda – Apply fix for white noise on Asus N550JV, too (boo#979278).
– ALSA: hda – Asus N750JV external subwoofer fixup (boo#979278).
– ALSA: hda – Fix broken reconfig (boo#979278).
– ALSA: hda – Fix headphone mic input on a few Dell ALC293 machines
(boo#979278).
– ALSA: hda – Fix subwoofer pin on ASUS N751 and N551 (boo#979278).
– ALSA: hda – Fix white noise on Asus N750JV headphone (boo#979278).
– ALSA: hda – Fix white noise on Asus UX501VW headset (boo#979278).
– ALSA: hda/realtek – Add ALC3234 headset mode for Optiplex 9020m
(boo#979278).
– ALSA: hda/realtek – New codecs support for ALC234/ALC274/ALC294
(boo#979278).
– ALSA: hda/realtek – New codec support of ALC225 (boo#979278).
– ALSA: hda/realtek – Support headset mode for ALC225 (boo#979278).
– ALSA: pcxhr: Fix missing mutex unlock (boo#979278).
– ALSA: usb-audio: Quirk for yet another Phoenix Audio devices (v2)
(boo#979278).
– bluetooth: fix power_on vs close race (bsc#966849).
– bluetooth: vhci: fix open_timeout vs. hdev race (bsc#971799,bsc#966849).
– bluetooth: vhci: Fix race at creating hci device (bsc#971799,bsc#966849).
– bluetooth: vhci: purge unhandled skbs (bsc#971799,bsc#966849).
– btrfs: do not use src fd for printk (bsc#980348).
– btrfs: fix crash/invalid memory access on fsync when using overlayfs
(bsc#977198)
– drm: qxl: Workaround for buggy user-space (bsc#981344).
– enic: set netdev->vlan_features (bsc#966245).
– fs: add file_dentry() (bsc#977198).
– IB/IPoIB: Do not set skb truesize since using one linearskb (bsc#980657).
– input: i8042 – lower log level for “no controller” message (bsc#945345).
– kabi: Add kabi/severities entries to ignore sound/hda/*, x509_*,
efivar_validate, file_open_root and dax_fault
– kabi: Add some fixups (module, pci_dev, drm, fuse and thermal)
– kabi: file_dentry changes (bsc#977198).
– kABI fixes for 4.1.22
– mm/page_alloc.c: calculate ‘available’ memory in a separate function
(bsc#982239).
– net: disable fragment reassembly if high_thresh is zero (bsc#970506).
– of: iommu: Silence misleading warning.
– pstore_register() error handling was wrong — it tried to release lock
before it’s acquired, causing spinlock / preemption imbalance. – usb:
quirk to stop runtime PM for Intel 7260 (bnc#984460).
– Revert “usb: hub: do not clear BOS field during reset device”
(boo#979728).
– usb: core: hub: hub_port_init lock controller instead of bus
(bnc#978073).
– usb: preserve kABI in address0 locking (bnc#978073).
– usb: usbip: fix potential out-of-bounds write (bnc#975945).
– USB: xhci: Add broken streams quirk for Frescologic device id 1009
(bnc#982712).
– virtio_balloon: do not change memory amount visible via /proc/meminfo
(bsc#982238).
– virtio_balloon: export ‘available’ memory to balloon statistics
(bsc#982239).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.1:

zypper in -t patch openSUSE-2016-753=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.1 (i686 x86_64):

kernel-debug-4.1.26-21.1
kernel-debug-base-4.1.26-21.1
kernel-debug-base-debuginfo-4.1.26-21.1
kernel-debug-debuginfo-4.1.26-21.1
kernel-debug-debugsource-4.1.26-21.1
kernel-debug-devel-4.1.26-21.1
kernel-debug-devel-debuginfo-4.1.26-21.1
kernel-ec2-4.1.26-21.1
kernel-ec2-base-4.1.26-21.1
kernel-ec2-base-debuginfo-4.1.26-21.1
kernel-ec2-debuginfo-4.1.26-21.1
kernel-ec2-debugsource-4.1.26-21.1
kernel-ec2-devel-4.1.26-21.1
kernel-pv-4.1.26-21.1
kernel-pv-base-4.1.26-21.1
kernel-pv-base-debuginfo-4.1.26-21.1
kernel-pv-debuginfo-4.1.26-21.1
kernel-pv-debugsource-4.1.26-21.1
kernel-pv-devel-4.1.26-21.1
kernel-vanilla-4.1.26-21.1
kernel-vanilla-debuginfo-4.1.26-21.1
kernel-vanilla-debugsource-4.1.26-21.1
kernel-vanilla-devel-4.1.26-21.1
kernel-xen-4.1.26-21.1
kernel-xen-base-4.1.26-21.1
kernel-xen-base-debuginfo-4.1.26-21.1
kernel-xen-debuginfo-4.1.26-21.1
kernel-xen-debugsource-4.1.26-21.1
kernel-xen-devel-4.1.26-21.1

– openSUSE Leap 42.1 (i586 x86_64):

kernel-default-4.1.26-21.1
kernel-default-base-4.1.26-21.1
kernel-default-base-debuginfo-4.1.26-21.1
kernel-default-debuginfo-4.1.26-21.1
kernel-default-debugsource-4.1.26-21.1
kernel-default-devel-4.1.26-21.1
kernel-obs-build-4.1.26-21.1
kernel-obs-build-debugsource-4.1.26-21.1
kernel-obs-qa-4.1.26-21.1
kernel-obs-qa-xen-4.1.26-21.1
kernel-syms-4.1.26-21.1

– openSUSE Leap 42.1 (noarch):

kernel-devel-4.1.26-21.1
kernel-docs-4.1.26-21.2
kernel-docs-html-4.1.26-21.2
kernel-docs-pdf-4.1.26-21.2
kernel-macros-4.1.26-21.1
kernel-source-4.1.26-21.1
kernel-source-vanilla-4.1.26-21.1

– openSUSE Leap 42.1 (i686):

kernel-pae-4.1.26-21.1
kernel-pae-base-4.1.26-21.1
kernel-pae-base-debuginfo-4.1.26-21.1
kernel-pae-debuginfo-4.1.26-21.1
kernel-pae-debugsource-4.1.26-21.1
kernel-pae-devel-4.1.26-21.1

References:

https://www.suse.com/security/cve/CVE-2013-7446.html
https://www.suse.com/security/cve/CVE-2016-0758.html
https://www.suse.com/security/cve/CVE-2016-1583.html
https://www.suse.com/security/cve/CVE-2016-2053.html
https://www.suse.com/security/cve/CVE-2016-3134.html
https://www.suse.com/security/cve/CVE-2016-3672.html
https://www.suse.com/security/cve/CVE-2016-3955.html
https://www.suse.com/security/cve/CVE-2016-4482.html
https://www.suse.com/security/cve/CVE-2016-4485.html
https://www.suse.com/security/cve/CVE-2016-4486.html
https://www.suse.com/security/cve/CVE-2016-4557.html
https://www.suse.com/security/cve/CVE-2016-4565.html
https://www.suse.com/security/cve/CVE-2016-4569.html
https://www.suse.com/security/cve/CVE-2016-4578.html
https://www.suse.com/security/cve/CVE-2016-4580.html
https://www.suse.com/security/cve/CVE-2016-4581.html
https://www.suse.com/security/cve/CVE-2016-4805.html
https://www.suse.com/security/cve/CVE-2016-4951.html
https://www.suse.com/security/cve/CVE-2016-5244.html
https://bugzilla.suse.com/945345
https://bugzilla.suse.com/955654
https://bugzilla.suse.com/963762
https://bugzilla.suse.com/966245
https://bugzilla.suse.com/966849
https://bugzilla.suse.com/970506
https://bugzilla.suse.com/971126
https://bugzilla.suse.com/971799
https://bugzilla.suse.com/973570
https://bugzilla.suse.com/974308
https://bugzilla.suse.com/975945
https://bugzilla.suse.com/977198
https://bugzilla.suse.com/978073
https://bugzilla.suse.com/978401
https://bugzilla.suse.com/978821
https://bugzilla.suse.com/978822
https://bugzilla.suse.com/979018
https://bugzilla.suse.com/979213
https://bugzilla.suse.com/979278
https://bugzilla.suse.com/979548
https://bugzilla.suse.com/979728
https://bugzilla.suse.com/979867
https://bugzilla.suse.com/979879
https://bugzilla.suse.com/979913
https://bugzilla.suse.com/980348
https://bugzilla.suse.com/980371
https://bugzilla.suse.com/980657
https://bugzilla.suse.com/981058
https://bugzilla.suse.com/981267
https://bugzilla.suse.com/981344
https://bugzilla.suse.com/982238
https://bugzilla.suse.com/982239
https://bugzilla.suse.com/982712
https://bugzilla.suse.com/983143
https://bugzilla.suse.com/983213
https://bugzilla.suse.com/984460


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Top
More in Preporuke
Sigurnosni nedostatak programskih paketa libimobiledevice i usbmuxd

Otkriven je sigurnosni nedostatak u programskim paketima libimobiledevice i usbmuxd za SUSE LE. Otkriveni nedostatak nalazio se u funkciji socket_create...

Close