Lucene search

K
suseSuseSUSE-SU-2014:1138-1
HistorySep 16, 2014 - 7:04 p.m.

Security update for the Linux Kernel (important)

2014-09-1619:04:20
lists.opensuse.org
25

0.075 Low

EPSS

Percentile

93.4%

The SUSE Linux Enterprise Server 11 SP1 LTSS received a roll up update to
fix several security and non-security issues.

The following security issues have been fixed:

   * CVE-2013-1860: Heap-based buffer overflow in the wdm_in_callback
     function in drivers/usb/class/cdc-wdm.c in the Linux kernel before
     3.8.4 allows physically proximate attackers to cause a denial of
     service (system crash) or possibly execute arbitrary code via a
     crafted cdc-wdm USB device. (bnc#806431)
   * CVE-2013-4162: The udp_v6_push_pending_frames function in
     net/ipv6/udp.c in the IPv6 implementation in the Linux kernel
     through 3.10.3 makes an incorrect function call for pending data,
     which allows local users to cause a denial of service (BUG and
     system crash) via a crafted application that uses the UDP_CORK
     option in a setsockopt system call. (bnc#831058)
   * CVE-2014-0203: The __do_follow_link function in fs/namei.c in the
     Linux kernel before 2.6.33 does not properly handle the last
     pathname component during use of certain filesystems, which allows
     local users to cause a denial of service (incorrect free operations
     and system crash) via an open system call. (bnc#883526)
   * CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2)
     BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter
     function in net/core/filter.c in the Linux kernel through 3.14.3 do
     not check whether a certain length value is sufficiently large,
     which allows local users to cause a denial of service (integer
     underflow and system crash) via crafted BPF instructions. NOTE: the
     affected code was moved to the __skb_get_nlattr and
     __skb_get_nlattr_nest functions before the vulnerability was
     announced. (bnc#877257)
   * CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in
     the sk_run_filter function in net/core/filter.c in the Linux kernel
     through 3.14.3 uses the reverse order in a certain subtraction,
     which allows local users to cause a denial of service (over-read and
     system crash) via crafted BPF instructions. NOTE: the affected code
     was moved to the __skb_get_nlattr_nest function before the
     vulnerability was announced. (bnc#877257)
   * CVE-2014-3917: kernel/auditsc.c in the Linux kernel through 3.14.5,
     when CONFIG_AUDITSYSCALL is enabled with certain syscall rules,
     allows local users to obtain potentially sensitive single-bit values
     from kernel memory or cause a denial of service (OOPS) via a large
     value of a syscall number. (bnc#880484)
   * CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel
     through 3.15.1 on 32-bit x86 platforms, when syscall auditing is
     enabled and the sep CPU feature flag is set, allows local users to
     cause a denial
     of service (OOPS and system crash) via an invalid syscall number, as

demonstrated by number 1000. (bnc#883724)
* CVE-2014-4652: Race condition in the tlv handler functionality in
the snd_ctl_elem_user_tlv function in sound/core/control.c in the
ALSA control implementation in the Linux kernel before 3.15.2 allows
local users to obtain sensitive information from kernel memory by
leveraging /dev/snd/controlCX access. (bnc#883795)
* CVE-2014-4653: sound/core/control.c in the ALSA control
implementation in the Linux kernel before 3.15.2 does not ensure
possession of a read/write lock, which allows local users to cause a
denial of service (use-after-free) and obtain sensitive information
from kernel memory by leveraging /dev/snd/controlCX access.
(bnc#883795)
* CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c
in the ALSA control implementation in the Linux kernel before 3.15.2
does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE
commands, which allows local users to remove kernel controls and
cause a denial of service (use-after-free and system crash) by
leveraging /dev/snd/controlCX access for an ioctl call. (bnc#883795)
* CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c
in the ALSA control implementation in the Linux kernel before 3.15.2
does not properly maintain the user_ctl_count value, which allows
local users to cause a denial of service (integer overflow and limit
bypass) by leveraging /dev/snd/controlCX access for a large number
of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls. (bnc#883795)
* CVE-2014-4656: Multiple integer overflows in sound/core/control.c in
the ALSA control implementation in the Linux kernel before 3.15.2
allow local users to cause a denial of service by leveraging
/dev/snd/controlCX access, related to (1) index values in the
snd_ctl_add function and (2) numid values in the
snd_ctl_remove_numid_conflict function. (bnc#883795)
* CVE-2014-4667: The sctp_association_free function in
net/sctp/associola.c in the Linux kernel before 3.15.2 does not
properly manage a certain backlog value, which allows remote
attackers to cause a denial of service (socket outage) via a crafted
SCTP packet. (bnc#885422)
* CVE-2014-4699: The Linux kernel before 3.15.4 on Intel processors
does not properly restrict use of a non-canonical value for the
saved RIP address in the case of a system call that does not use
IRET, which allows local users to leverage a race condition and gain
privileges, or cause a denial of service (double fault), via a
crafted application that makes ptrace and fork system calls.
(bnc#885725)
* CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
Linux kernel through 3.15.6 allows local users to gain privileges by
leveraging data-structure differences between an l2tp socket and an
inet socket. (bnc#887082)
* CVE-2014-5077: The sctp_assoc_update function in
net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP
authentication is enabled, allows remote attackers to cause a denial
of service (NULL pointer dereference and OOPS) by starting to
establish an association between two endpoints immediately after an
exchange of INIT and INIT ACK chunks to establish an earlier
association between these endpoints in the opposite direction.
(bnc#889173)
* CVE-2013-7266: The mISDN_sock_recvmsg function in
drivers/isdn/mISDN/socket.c in the Linux kernel before 3.12.4 does
not ensure that a certain length value is consistent with the size
of an associated data structure, which allows local users to obtain
sensitive information from kernel memory via a (1) recvfrom, (2)
recvmmsg, or (3) recvmsg system call. (bnc#854722)
* CVE-2013-7267: The atalk_recvmsg function in net/appletalk/ddp.c in
the Linux kernel before 3.12.4 updates a certain length value
without ensuring that an associated data structure has been
initialized, which allows local users to obtain sensitive
information from kernel memory via a (1) recvfrom, (2) recvmmsg, or
(3) recvmsg system call. (bnc#854722)
* CVE-2013-7268: The ipx_recvmsg function in net/ipx/af_ipx.c in the
Linux kernel before 3.12.4 updates a certain length value without
ensuring that an associated data structure has been initialized,
which allows local users to obtain sensitive information from kernel
memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
(bnc#854722)
* CVE-2013-7269: The nr_recvmsg function in net/netrom/af_netrom.c in
the Linux kernel before 3.12.4 updates a certain length value
without ensuring that an associated data structure has been
initialized, which allows local users to obtain sensitive
information from kernel memory via a (1) recvfrom, (2) recvmmsg, or
(3) recvmsg system call. (bnc#854722)
* CVE-2013-7270: The packet_recvmsg function in net/packet/af_packet.c
in the Linux kernel before 3.12.4 updates a certain length value
before ensuring that an associated data structure has been
initialized, which allows local users to obtain sensitive
information from kernel memory via a (1) recvfrom, (2) recvmmsg, or
(3) recvmsg system call. (bnc#854722)
* CVE-2013-7271: The x25_recvmsg function in net/x25/af_x25.c in the
Linux kernel before 3.12.4 updates a certain length value without
ensuring that an associated data structure has been initialized,
which allows local users to obtain sensitive information from kernel
memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
(bnc#854722)

The following bugs have been fixed:

   * mac80211: Fix AP powersave TX vs. wakeup race (bnc#871797).
   * tcp: Allow to disable cwnd moderation in TCP_CA_Loss state
     (bnc#879921).
   * tcp: Adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
   * flock: Fix allocation and BKL (bnc#882809).
   * sunrpc: Close a rare race in xs_tcp_setup_socket (bnc#794824,
     bnc#884530).
   * isofs: Fix unbounded recursion when processing relocated directories
     (bnc#892490).
   * bonding: Fix a race condition on cleanup in
     bond_send_unsolicited_na() (bnc#856756).
   * block: Fix race between request completion and timeout handling
     (bnc#881051).
   * Fix kABI breakage due to addition of user_ctl_lock (bnc#883795).

Security Issues:

   * CVE-2013-1860
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1860">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1860</a>&gt;
   * CVE-2013-4162
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162</a>&gt;
   * CVE-2013-7266
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7266">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7266</a>&gt;
   * CVE-2013-7267
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7267">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7267</a>&gt;
   * CVE-2013-7268
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7268">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7268</a>&gt;
   * CVE-2013-7269
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7269">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7269</a>&gt;
   * CVE-2013-7270
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7270">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7270</a>&gt;
   * CVE-2013-7271
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7271">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7271</a>&gt;
   * CVE-2014-0203
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0203">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0203</a>&gt;
   * CVE-2014-3144
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144</a>&gt;
   * CVE-2014-3145
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145</a>&gt;
   * CVE-2014-3917
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917</a>&gt;
   * CVE-2014-4508
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508</a>&gt;
   * CVE-2014-4652
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652</a>&gt;
   * CVE-2014-4653
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653</a>&gt;
   * CVE-2014-4654
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654</a>&gt;
   * CVE-2014-4655
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655</a>&gt;
   * CVE-2014-4656
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656</a>&gt;
   * CVE-2014-4667
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667</a>&gt;
   * CVE-2014-4699
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699</a>&gt;
   * CVE-2014-4943
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943</a>&gt;
   * CVE-2014-5077
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077</a>&gt;

References