openSUSE Security Update: kernel: security and bugfix update
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2012:1330-1
Rating:             important
References:         #762693 #765230 #771392 #772566 #772831 #772923 
                    #773406 #774523 #774859 #776925 #778630 #779432 
                    #780624 #781134 
Cross-References:   CVE-2012-3412 CVE-2012-3520
Affected Products:
                    openSUSE 12.2
______________________________________________________________________________

   An update that solves two vulnerabilities and has 12 fixes
   is now available.

Description:

   This kernel update to 3.4.11 fixes various bugs and
   security issues.

   The changes up to 3.4.11 contain both security and bugfixes
   and are not explicitly listed here.

   Following security issues were fixed: CVE-2012-3520: Force
   passing credentials, otherwise local services could be
   fooled to assume requests coming from root.

   CVE-2012-3412: Do not allow extreme TSO parameters in the
   sfc driver and tcp stack.

   Following non-security bugs were fixed:
   - nbd: clear waiting_queue on shutdown (bnc#778630).
   - NFS: avoid warning from nfs_drop_nlink (bnc#780624).
   - net: do not disable sg for packets requiring no checksum
   (bnc#774859).

   - sfc: Fix maximum number of TSO segments and minimum TX
   queue size (bnc#774523 CVE-2012-3412).
   - net: Allow driver to limit number of GSO segments per skb
   (bnc#774523 CVE-2012-3412).

   - drm/nouveau: fix booting with plymouth + dumb support
   (bnc#771392).

   - memcg: warn on deeper hierarchies with use_hierarchy==0
   (bnc#781134).

   - Linux 3.4.11.
   - Update config files.
   - Refresh patches.suse/scsi-error-test-unit-ready-timeout.

   - Btrfs: fix tree log remove space corner case (bnc#779432)

   - irq_remap: disable IRQ remapping if any IOAPIC lacks an
   IOMMU.

   - Linux 3.4.10.

   - Linux 3.4.9.
   - kABI: protect struct irq_desc.

   - Linux 3.4.8.
   - kABI: sdhci, remove inclusion.

   - reiserfs: fix deadlock with nfs racing on create/lookup
   (bnc#762693).

   - Properly update Xen patches to 3.4.7.
   - Refresh other Xen patches (bnc#772831).

   - config: enable various ARM errata workarounds to improve
   stability

   - Import kabi files for 12.2

   - rpm/config.sh: Build the KOTD against 12.2

   - ASoC: omap: Add missing modules aliases to get sound
   working on omap devices.

   - Update config files to fix build

   - rt2800: add chipset revision RT5390R support (bnc#772566).

   - reiserfs: fix deadlocks with quotas

   - ACPI, APEI: Fixup common access width firmware bug
   (bnc#765230).

   - i2c/busses: Fix build error if
   CONFIG_I2C_DESIGNWARE_PLATFORM=y and CONFIG_I2C_DESIGN.

   - Update ARM configs to match kernel 3.4.7

   - Update ARM omap2plus config to match kernel 3.4.7 and add
   Smartreflex support (auto voltage)

   - ALSA: hda - Fix mute-LED GPIO initialization for IDT
   codecs (bnc#772923).
   - ALSA: hda - Fix polarity of mute LED on HP Mini 210
   (bnc#772923).

   - Linux 3.4.7.
   - Refresh patches.suse/dm-raid45-26-Nov-2009.patch.

   - Enable RTL8150 for omap2plus Generic USB Network device
   that also works fine on ARM, so enable it

   - update RNDIS_OID_GEN_RNDIS_CONFIG_PARAMETER patch name

   - Drivers: hv: Cleanup the guest ID computation.

   - hyperv: Add a check for ring_size value.
   - hyperv: Add error handling to rndis_filter_device_add().
   - Drivers: hv: Change the hex constant to a decimal
   constant.
   - hyperv: Add support for setting MAC from within guests.
   - net/hyperv: Use wait_event on outstanding sends during
   device removal.
   - hv: add RNDIS_OID_GEN_RNDIS_CONFIG_PARAMETER.

   - Refresh patches.suse/SUSE-bootsplash. Fix wrong vfree()
   (bnc#773406)


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 12.2:

      zypper in -t patch openSUSE-2012-700

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 12.2 (i586 x86_64):

      kernel-default-3.4.11-2.16.1
      kernel-default-base-3.4.11-2.16.1
      kernel-default-base-debuginfo-3.4.11-2.16.1
      kernel-default-debuginfo-3.4.11-2.16.1
      kernel-default-debugsource-3.4.11-2.16.1
      kernel-default-devel-3.4.11-2.16.1
      kernel-default-devel-debuginfo-3.4.11-2.16.1
      kernel-syms-3.4.11-2.16.1

   - openSUSE 12.2 (i686 x86_64):

      kernel-debug-3.4.11-2.16.1
      kernel-debug-base-3.4.11-2.16.1
      kernel-debug-base-debuginfo-3.4.11-2.16.1
      kernel-debug-debuginfo-3.4.11-2.16.1
      kernel-debug-debugsource-3.4.11-2.16.1
      kernel-debug-devel-3.4.11-2.16.1
      kernel-debug-devel-debuginfo-3.4.11-2.16.1
      kernel-desktop-3.4.11-2.16.1
      kernel-desktop-base-3.4.11-2.16.1
      kernel-desktop-base-debuginfo-3.4.11-2.16.1
      kernel-desktop-debuginfo-3.4.11-2.16.1
      kernel-desktop-debugsource-3.4.11-2.16.1
      kernel-desktop-devel-3.4.11-2.16.1
      kernel-desktop-devel-debuginfo-3.4.11-2.16.1
      kernel-ec2-3.4.11-2.16.1
      kernel-ec2-base-3.4.11-2.16.1
      kernel-ec2-base-debuginfo-3.4.11-2.16.1
      kernel-ec2-debuginfo-3.4.11-2.16.1
      kernel-ec2-debugsource-3.4.11-2.16.1
      kernel-ec2-devel-3.4.11-2.16.1
      kernel-ec2-devel-debuginfo-3.4.11-2.16.1
      kernel-ec2-extra-3.4.11-2.16.1
      kernel-ec2-extra-debuginfo-3.4.11-2.16.1
      kernel-trace-3.4.11-2.16.1
      kernel-trace-base-3.4.11-2.16.1
      kernel-trace-base-debuginfo-3.4.11-2.16.1
      kernel-trace-debuginfo-3.4.11-2.16.1
      kernel-trace-debugsource-3.4.11-2.16.1
      kernel-trace-devel-3.4.11-2.16.1
      kernel-trace-devel-debuginfo-3.4.11-2.16.1
      kernel-vanilla-3.4.11-2.16.1
      kernel-vanilla-debuginfo-3.4.11-2.16.1
      kernel-vanilla-debugsource-3.4.11-2.16.1
      kernel-vanilla-devel-3.4.11-2.16.1
      kernel-vanilla-devel-debuginfo-3.4.11-2.16.1
      kernel-xen-3.4.11-2.16.1
      kernel-xen-base-3.4.11-2.16.1
      kernel-xen-base-debuginfo-3.4.11-2.16.1
      kernel-xen-debuginfo-3.4.11-2.16.1
      kernel-xen-debugsource-3.4.11-2.16.1
      kernel-xen-devel-3.4.11-2.16.1
      kernel-xen-devel-debuginfo-3.4.11-2.16.1

   - openSUSE 12.2 (noarch):

      kernel-devel-3.4.11-2.16.1
      kernel-docs-3.4.11-2.16.2
      kernel-source-3.4.11-2.16.1
      kernel-source-vanilla-3.4.11-2.16.1

   - openSUSE 12.2 (i686):

      kernel-pae-3.4.11-2.16.1
      kernel-pae-base-3.4.11-2.16.1
      kernel-pae-base-debuginfo-3.4.11-2.16.1
      kernel-pae-debuginfo-3.4.11-2.16.1
      kernel-pae-debugsource-3.4.11-2.16.1
      kernel-pae-devel-3.4.11-2.16.1
      kernel-pae-devel-debuginfo-3.4.11-2.16.1


References:

   https://www.suse.com/security/cve/CVE-2012-3412.html
   https://www.suse.com/security/cve/CVE-2012-3520.html
   https://bugzilla.novell.com/762693
   https://bugzilla.novell.com/765230
   https://bugzilla.novell.com/771392
   https://bugzilla.novell.com/772566
   https://bugzilla.novell.com/772831
   https://bugzilla.novell.com/772923
   https://bugzilla.novell.com/773406
   https://bugzilla.novell.com/774523
   https://bugzilla.novell.com/774859
   https://bugzilla.novell.com/776925
   https://bugzilla.novell.com/778630
   https://bugzilla.novell.com/779432
   https://bugzilla.novell.com/780624
   https://bugzilla.novell.com/781134

-- 

openSUSE: 2012:1330-1: important: kernel

October 12, 2012
An update that solves two vulnerabilities and has 12 fixes is now available.

Description

This kernel update to 3.4.11 fixes various bugs and security issues. The changes up to 3.4.11 contain both security and bugfixes and are not explicitly listed here. Following security issues were fixed: CVE-2012-3520: Force passing credentials, otherwise local services could be fooled to assume requests coming from root. CVE-2012-3412: Do not allow extreme TSO parameters in the sfc driver and tcp stack. Following non-security bugs were fixed: - nbd: clear waiting_queue on shutdown (bnc#778630). - NFS: avoid warning from nfs_drop_nlink (bnc#780624). - net: do not disable sg for packets requiring no checksum (bnc#774859). - sfc: Fix maximum number of TSO segments and minimum TX queue size (bnc#774523 CVE-2012-3412). - net: Allow driver to limit number of GSO segments per skb (bnc#774523 CVE-2012-3412). - drm/nouveau: fix booting with plymouth + dumb support (bnc#771392). - memcg: warn on deeper hierarchies with use_hierarchy==0 (bnc#781134). - Linux 3.4.11. - Update config files. - Refresh patches.suse/scsi-error-test-unit-ready-timeout. - Btrfs: fix tree log remove space corner case (bnc#779432) - irq_remap: disable IRQ remapping if any IOAPIC lacks an IOMMU. - Linux 3.4.10. - Linux 3.4.9. - kABI: protect struct irq_desc. - Linux 3.4.8. - kABI: sdhci, remove inclusion. - reiserfs: fix deadlock with nfs racing on create/lookup (bnc#762693). - Properly update Xen patches to 3.4.7. - Refresh other Xen patches (bnc#772831). - config: enable various ARM errata workarounds to improve stability - Import kabi files for 12.2 - rpm/config.sh: Build the KOTD against 12.2 - ASoC: omap: Add missing modules aliases to get sound working on omap devices. - Update config files to fix build - rt2800: add chipset revision RT5390R support (bnc#772566). - reiserfs: fix deadlocks with quotas - ACPI, APEI: Fixup common access width firmware bug (bnc#765230). - i2c/busses: Fix build error if CONFIG_I2C_DESIGNWARE_PLATFORM=y and CONFIG_I2C_DESIGN. - Update ARM configs to match kernel 3.4.7 - Update ARM omap2plus config to match kernel 3.4.7 and add Smartreflex support (auto voltage) - ALSA: hda - Fix mute-LED GPIO initialization for IDT codecs (bnc#772923). - ALSA: hda - Fix polarity of mute LED on HP Mini 210 (bnc#772923). - Linux 3.4.7. - Refresh patches.suse/dm-raid45-26-Nov-2009.patch. - Enable RTL8150 for omap2plus Generic USB Network device that also works fine on ARM, so enable it - update RNDIS_OID_GEN_RNDIS_CONFIG_PARAMETER patch name - Drivers: hv: Cleanup the guest ID computation. - hyperv: Add a check for ring_size value. - hyperv: Add error handling to rndis_filter_device_add(). - Drivers: hv: Change the hex constant to a decimal constant. - hyperv: Add support for setting MAC from within guests. - net/hyperv: Use wait_event on outstanding sends during device removal. - hv: add RNDIS_OID_GEN_RNDIS_CONFIG_PARAMETER. - Refresh patches.suse/SUSE-bootsplash. Fix wrong vfree() (bnc#773406)

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.2: zypper in -t patch openSUSE-2012-700 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 12.2 (i586 x86_64): kernel-default-3.4.11-2.16.1 kernel-default-base-3.4.11-2.16.1 kernel-default-base-debuginfo-3.4.11-2.16.1 kernel-default-debuginfo-3.4.11-2.16.1 kernel-default-debugsource-3.4.11-2.16.1 kernel-default-devel-3.4.11-2.16.1 kernel-default-devel-debuginfo-3.4.11-2.16.1 kernel-syms-3.4.11-2.16.1 - openSUSE 12.2 (i686 x86_64): kernel-debug-3.4.11-2.16.1 kernel-debug-base-3.4.11-2.16.1 kernel-debug-base-debuginfo-3.4.11-2.16.1 kernel-debug-debuginfo-3.4.11-2.16.1 kernel-debug-debugsource-3.4.11-2.16.1 kernel-debug-devel-3.4.11-2.16.1 kernel-debug-devel-debuginfo-3.4.11-2.16.1 kernel-desktop-3.4.11-2.16.1 kernel-desktop-base-3.4.11-2.16.1 kernel-desktop-base-debuginfo-3.4.11-2.16.1 kernel-desktop-debuginfo-3.4.11-2.16.1 kernel-desktop-debugsource-3.4.11-2.16.1 kernel-desktop-devel-3.4.11-2.16.1 kernel-desktop-devel-debuginfo-3.4.11-2.16.1 kernel-ec2-3.4.11-2.16.1 kernel-ec2-base-3.4.11-2.16.1 kernel-ec2-base-debuginfo-3.4.11-2.16.1 kernel-ec2-debuginfo-3.4.11-2.16.1 kernel-ec2-debugsource-3.4.11-2.16.1 kernel-ec2-devel-3.4.11-2.16.1 kernel-ec2-devel-debuginfo-3.4.11-2.16.1 kernel-ec2-extra-3.4.11-2.16.1 kernel-ec2-extra-debuginfo-3.4.11-2.16.1 kernel-trace-3.4.11-2.16.1 kernel-trace-base-3.4.11-2.16.1 kernel-trace-base-debuginfo-3.4.11-2.16.1 kernel-trace-debuginfo-3.4.11-2.16.1 kernel-trace-debugsource-3.4.11-2.16.1 kernel-trace-devel-3.4.11-2.16.1 kernel-trace-devel-debuginfo-3.4.11-2.16.1 kernel-vanilla-3.4.11-2.16.1 kernel-vanilla-debuginfo-3.4.11-2.16.1 kernel-vanilla-debugsource-3.4.11-2.16.1 kernel-vanilla-devel-3.4.11-2.16.1 kernel-vanilla-devel-debuginfo-3.4.11-2.16.1 kernel-xen-3.4.11-2.16.1 kernel-xen-base-3.4.11-2.16.1 kernel-xen-base-debuginfo-3.4.11-2.16.1 kernel-xen-debuginfo-3.4.11-2.16.1 kernel-xen-debugsource-3.4.11-2.16.1 kernel-xen-devel-3.4.11-2.16.1 kernel-xen-devel-debuginfo-3.4.11-2.16.1 - openSUSE 12.2 (noarch): kernel-devel-3.4.11-2.16.1 kernel-docs-3.4.11-2.16.2 kernel-source-3.4.11-2.16.1 kernel-source-vanilla-3.4.11-2.16.1 - openSUSE 12.2 (i686): kernel-pae-3.4.11-2.16.1 kernel-pae-base-3.4.11-2.16.1 kernel-pae-base-debuginfo-3.4.11-2.16.1 kernel-pae-debuginfo-3.4.11-2.16.1 kernel-pae-debugsource-3.4.11-2.16.1 kernel-pae-devel-3.4.11-2.16.1 kernel-pae-devel-debuginfo-3.4.11-2.16.1


References

https://www.suse.com/security/cve/CVE-2012-3412.html https://www.suse.com/security/cve/CVE-2012-3520.html https://bugzilla.novell.com/762693 https://bugzilla.novell.com/765230 https://bugzilla.novell.com/771392 https://bugzilla.novell.com/772566 https://bugzilla.novell.com/772831 https://bugzilla.novell.com/772923 https://bugzilla.novell.com/773406 https://bugzilla.novell.com/774523 https://bugzilla.novell.com/774859 https://bugzilla.novell.com/776925 https://bugzilla.novell.com/778630 https://bugzilla.novell.com/779432 https://bugzilla.novell.com/780624 https://bugzilla.novell.com/781134--


Severity
Announcement ID: openSUSE-SU-2012:1330-1
Rating: important
Affected Products: openSUSE 12.2 le.

Related News