You are here
Home > Preporuke > Sigurnosni nedostaci u jezgri operacijskog sustava

Sigurnosni nedostaci u jezgri operacijskog sustava

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: kernel: security and bugfix update
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:0677-1
Rating: important
References: #733022 #811746 #833968 #837111 #851426 #852652
#852967 #858233 #858638 #858869 #858870 #858872
#860835 #862145 #863335 #864025 #866102 #868653
#869414 #869898 #871148 #871252 #871325 #873717
#875690 #875798
Cross-References: CVE-2013-4254 CVE-2013-4579 CVE-2013-6885
CVE-2014-0101 CVE-2014-0196 CVE-2014-0691
CVE-2014-1438 CVE-2014-1444 CVE-2014-1445
CVE-2014-1446 CVE-2014-1690 CVE-2014-1737
CVE-2014-1738 CVE-2014-1874 CVE-2014-2523
CVE-2014-2672
Affected Products:
openSUSE 12.3
______________________________________________________________________________

An update that solves 16 vulnerabilities and has 10 fixes
is now available.

Description:

The Linux Kernel was updated to fix various security issues and bugs.

Main security issues fixed:

A security issue in the tty layer that was fixed that could be used by
local attackers for code execution (CVE-2014-0196).

Two security issues in the floppy driver were fixed that could be used by
local attackers on machines with the floppy to crash the kernel or
potentially execute code in the kernel (CVE-2014-1737 CVE-2014-1738).

Other security issues and bugs that were fixed:
– netfilter: nf_nat: fix access to uninitialized buffer in IRC NAT helper
(bnc#860835 CVE-2014-1690).

– net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH
(bnc#866102, CVE-2014-0101).

– n_tty: Fix a n_tty_write crash and code execution when echoing in raw
mode (bnc#871252 bnc#875690 CVE-2014-0196).

– netfilter: nf_ct_sip: support Cisco 7941/7945 IP phones (bnc#873717).

– Update config files: re-enable twofish crypto support Software twofish
crypto support was disabled in several architectures since openSUSE
10.3. For i386 and x86_64 it was on purpose, because
hardware-accelerated alternatives exist. However for all other
architectures it was by accident. Re-enable software twofish crypto
support in arm, ia64 and ppc configuration files, to guarantee that at
least one implementation is always available (bnc#871325).

– Update config files: disable CONFIG_TOUCHSCREEN_W90X900 The w90p910_ts
driver only makes sense on the W90x900 architecture, which we do not
support.

– ath9k: protect tid->sched check (bnc#871148,CVE-2014-2672).

– Fix dst_neigh_lookup/dst_neigh_lookup_skb return value handling bug
(bnc#869898).

– SELinux: Fix kernel BUG on empty security contexts
(bnc#863335,CVE-2014-1874).

– hamradio/yam: fix info leak in ioctl (bnc#858872, CVE-2014-1446).

– wanxl: fix info leak in ioctl (bnc#858870, CVE-2014-1445).

– farsync: fix info leak in ioctl (bnc#858869, CVE-2014-1444).

– ARM: 7809/1: perf: fix event validation for software group leaders
(CVE-2013-4254, bnc#837111).

– netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
(bnc#868653, CVE-2014-2523).

– ath9k_htc: properly set MAC address and BSSID mask (bnc#851426,
CVE-2013-4579).

– drm/ttm: don’t oops if no invalidate_caches() (bnc#869414).

– Apply missing patches.fixes/drm-nouveau-hwmon-rename-fan0-to-fan1.patch

– xfs: growfs: use uncached buffers for new headers (bnc#858233).

– xfs: use btree block initialisation functions in growfs (bnc#858233).

– Revert “Delete
patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end
.” (bnc#858233) Put back again the patch
patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end
back as there is a better fix than reverting the affecting patch.

– Delete
patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end
. It turned out that this patch causes regressions (bnc#858233) The
upstream 3.7.x also reverted it in the end (commit c3793e0d94af2).

– tcp: syncookies: reduce cookie lifetime to 128 seconds (bnc#833968).
– tcp: syncookies: reduce mss table to four values (bnc#833968).

– x86, cpu, amd: Add workaround for family 16h, erratum 793 (bnc#852967
CVE-2013-6885).

– cifs: ensure that uncached writes handle unmapped areas correctly
(bnc#864025 CVE-2014-0691).

– x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround (bnc#858638
CVE-2014-1438).

– xencons: generalize use of add_preferred_console() (bnc#733022,
bnc#852652).
– balloon: don’t crash in HVM-with-PoD guests.
– hwmon: (coretemp) Fix truncated name of alarm attributes.

– NFS: Avoid PUTROOTFH when managing leases (bnc#811746).

– cifs: delay super block destruction until all cifsFileInfo objects are
gone (bnc#862145).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE 12.3:

zypper in -t patch openSUSE-2014-376

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE 12.3 (i586 x86_64):

kernel-default-3.7.10-1.32.1
kernel-default-base-3.7.10-1.32.1
kernel-default-base-debuginfo-3.7.10-1.32.1
kernel-default-debuginfo-3.7.10-1.32.1
kernel-default-debugsource-3.7.10-1.32.1
kernel-default-devel-3.7.10-1.32.1
kernel-default-devel-debuginfo-3.7.10-1.32.1
kernel-syms-3.7.10-1.32.1

– openSUSE 12.3 (i686 x86_64):

kernel-debug-3.7.10-1.32.1
kernel-debug-base-3.7.10-1.32.1
kernel-debug-base-debuginfo-3.7.10-1.32.1
kernel-debug-debuginfo-3.7.10-1.32.1
kernel-debug-debugsource-3.7.10-1.32.1
kernel-debug-devel-3.7.10-1.32.1
kernel-debug-devel-debuginfo-3.7.10-1.32.1
kernel-desktop-3.7.10-1.32.1
kernel-desktop-base-3.7.10-1.32.1
kernel-desktop-base-debuginfo-3.7.10-1.32.1
kernel-desktop-debuginfo-3.7.10-1.32.1
kernel-desktop-debugsource-3.7.10-1.32.1
kernel-desktop-devel-3.7.10-1.32.1
kernel-desktop-devel-debuginfo-3.7.10-1.32.1
kernel-ec2-3.7.10-1.32.1
kernel-ec2-base-3.7.10-1.32.1
kernel-ec2-base-debuginfo-3.7.10-1.32.1
kernel-ec2-debuginfo-3.7.10-1.32.1
kernel-ec2-debugsource-3.7.10-1.32.1
kernel-ec2-devel-3.7.10-1.32.1
kernel-ec2-devel-debuginfo-3.7.10-1.32.1
kernel-trace-3.7.10-1.32.1
kernel-trace-base-3.7.10-1.32.1
kernel-trace-base-debuginfo-3.7.10-1.32.1
kernel-trace-debuginfo-3.7.10-1.32.1
kernel-trace-debugsource-3.7.10-1.32.1
kernel-trace-devel-3.7.10-1.32.1
kernel-trace-devel-debuginfo-3.7.10-1.32.1
kernel-vanilla-3.7.10-1.32.1
kernel-vanilla-debuginfo-3.7.10-1.32.1
kernel-vanilla-debugsource-3.7.10-1.32.1
kernel-vanilla-devel-3.7.10-1.32.1
kernel-vanilla-devel-debuginfo-3.7.10-1.32.1
kernel-xen-3.7.10-1.32.1
kernel-xen-base-3.7.10-1.32.1
kernel-xen-base-debuginfo-3.7.10-1.32.1
kernel-xen-debuginfo-3.7.10-1.32.1
kernel-xen-debugsource-3.7.10-1.32.1
kernel-xen-devel-3.7.10-1.32.1
kernel-xen-devel-debuginfo-3.7.10-1.32.1

– openSUSE 12.3 (noarch):

kernel-devel-3.7.10-1.32.1
kernel-docs-3.7.10-1.32.2
kernel-source-3.7.10-1.32.1
kernel-source-vanilla-3.7.10-1.32.1

– openSUSE 12.3 (i686):

kernel-pae-3.7.10-1.32.1
kernel-pae-base-3.7.10-1.32.1
kernel-pae-base-debuginfo-3.7.10-1.32.1
kernel-pae-debuginfo-3.7.10-1.32.1
kernel-pae-debugsource-3.7.10-1.32.1
kernel-pae-devel-3.7.10-1.32.1
kernel-pae-devel-debuginfo-3.7.10-1.32.1

References:

http://support.novell.com/security/cve/CVE-2013-4254.html
http://support.novell.com/security/cve/CVE-2013-4579.html
http://support.novell.com/security/cve/CVE-2013-6885.html
http://support.novell.com/security/cve/CVE-2014-0101.html
http://support.novell.com/security/cve/CVE-2014-0196.html
http://support.novell.com/security/cve/CVE-2014-0691.html
http://support.novell.com/security/cve/CVE-2014-1438.html
http://support.novell.com/security/cve/CVE-2014-1444.html
http://support.novell.com/security/cve/CVE-2014-1445.html
http://support.novell.com/security/cve/CVE-2014-1446.html
http://support.novell.com/security/cve/CVE-2014-1690.html
http://support.novell.com/security/cve/CVE-2014-1737.html
http://support.novell.com/security/cve/CVE-2014-1738.html
http://support.novell.com/security/cve/CVE-2014-1874.html
http://support.novell.com/security/cve/CVE-2014-2523.html
http://support.novell.com/security/cve/CVE-2014-2672.html
https://bugzilla.novell.com/733022
https://bugzilla.novell.com/811746
https://bugzilla.novell.com/833968
https://bugzilla.novell.com/837111
https://bugzilla.novell.com/851426
https://bugzilla.novell.com/852652
https://bugzilla.novell.com/852967
https://bugzilla.novell.com/858233
https://bugzilla.novell.com/858638
https://bugzilla.novell.com/858869
https://bugzilla.novell.com/858870
https://bugzilla.novell.com/858872
https://bugzilla.novell.com/860835
https://bugzilla.novell.com/862145
https://bugzilla.novell.com/863335
https://bugzilla.novell.com/864025
https://bugzilla.novell.com/866102
https://bugzilla.novell.com/868653
https://bugzilla.novell.com/869414
https://bugzilla.novell.com/869898
https://bugzilla.novell.com/871148
https://bugzilla.novell.com/871252
https://bugzilla.novell.com/871325
https://bugzilla.novell.com/873717
https://bugzilla.novell.com/875690
https://bugzilla.novell.com/875798


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: kernel: security and bugfix update
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:0678-1
Rating: important
References: #639379 #812592 #81660 #821619 #833968 #842553
#849334 #851244 #851426 #852656 #852967 #853350
#856760 #857643 #858638 #858872 #859342 #860502
#860835 #861750 #862746 #863235 #863335 #864025
#864867 #865075 #866075 #866102 #867718 #868653
#869414 #871148 #871160 #871252 #871325 #875440
#875690 #875798 #876531 #876699
Cross-References: CVE-2013-4579 CVE-2013-6885 CVE-2013-7263
CVE-2013-7264 CVE-2013-7265 CVE-2013-7281
CVE-2014-0069 CVE-2014-0101 CVE-2014-0196
CVE-2014-1438 CVE-2014-1446 CVE-2014-1690
CVE-2014-1737 CVE-2014-1738 CVE-2014-1874
CVE-2014-2523 CVE-2014-2672
Affected Products:
openSUSE 13.1
______________________________________________________________________________

An update that solves 17 vulnerabilities and has 23 fixes
is now available.

Description:

This Linux kernel security update fixes various security issues and bugs.

The Linux Kernel was updated to fix various security issues and bugs.

Main security issues fixed:

A security issue in the tty layer that was fixed that could be used by
local attackers for code execution (CVE-2014-0196).

Two security issues in the floppy driver were fixed that could be used by
local attackers on machines with the floppy to crash the kernel or
potentially execute code in the kernel (CVE-2014-1737 CVE-2014-1738).

Other security issues and bugfixes:
– netfilter: nf_nat: fix access to uninitialized buffer in IRC NAT helper
(bnc#860835 CVE-2014-1690).

– net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH
(bnc#866102, CVE-2014-0101).

– [media] ivtv: Fix Oops when no firmware is loaded (bnc#875440).

– ALSA: hda – Add dock pin setups for Thinkpad T440 (bnc#876699).

– ip6tnl: fix double free of fb_tnl_dev on exit (bnc#876531).

– Update arm config files: Enable all USB-to-serial drivers Specifically,
enable USB_SERIAL_WISHBONE and USB_SERIAL_QT2 on all arm flavors.

– mei: limit the number of consecutive resets (bnc#821619,bnc#852656).
– mei: revamp mei reset state machine (bnc#821619,bnc#852656).
– mei: use hbm idle state to prevent spurious resets (bnc#821619).
– mei: do not run reset flow from the interrupt thread
(bnc#821619,bnc#852656).
– mei: don’t get stuck in select during reset (bnc#821619).
– mei: wake also writers on reset (bnc#821619).
– mei: remove flash_work_queue (bnc#821619,bnc#852656).

– mei: me: do not load the driver if the FW doesn’t support MEI interface
(bnc#821619).

– Update ec2 config files: Disable CONFIG_CAN CAN support is disabled
everywhere else, so disable it in ec2 too.

– Refresh Xen patches (bnc#851244).

– Update arm/exynos config file: disable AHCI_IMX This driver is only used
on Freescale i.MX systems so it isn’t needed on Exynos.

– drm: Prefer noninterlace cmdline mode unless explicitly specified
(bnc#853350).

– kabi/severities: add exception for irda. The changes resulted in a 4x
performance increase. Any external users of this API will also want to
rebuild their modules.

– i7core_edac: Fix PCI device reference count.

– KABI: revert tcp: TSO packets automatic sizing.
– KABI: revert tcp: TSQ can use a dynamic limit.

– kabi: add exceptions for kvm and l2tp

– patches.fixes/sunrpc-add-an-info-file-for-the-dummy-gssd-pipe.patch:
Move include of utsname.h to where it’s needed to avoid kABI breakage
due to utsname becoming defined.

– Update kabi files. The kABI references were never establishd at release.

– Refresh patches.rpmify/chipidea-clean-up-dependencies Replace OF_DEVICE
by OF (OF_DEVICE does not exist anymore.)

– inet: fix addr_len/msg->msg_namelen assignment in recv_error and rxpmtu
functions (bnc#857643 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265).
– inet: prevent leakage of uninitialized memory to user in recv syscalls
(bnc#857643 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7281).

– Update config files: re-enable twofish crypto support Software twofish
crypto support was disabled in several architectures since openSUSE
10.3. For i386 and x86_64 it was on purpose, because
hardware-accelerated alternatives exist. However for all other
architectures it was by accident. Re-enable software twofish crypto
support in arm, ia64 and ppc configuration files, to guarantee that at
least one implementation is always available (bnc#871325).

– kvm: optimize away THP checks in kvm_is_mmio_pfn() (bnc#871160).
– Update patches.fixes/mm-close-PageTail-race.patch (bnc#871160).
– Update patches.fixes/mm-hugetlbfs-fix-hugetlbfs-optimization.patch
(bnc#871160).

– mm: close PageTail race (bnc#81660).
– mm: hugetlbfs: fix hugetlbfs optimization (bnc#81660).

– Update config files: disable CONFIG_TOUCHSCREEN_W90X900 The w90p910_ts
driver only makes sense on the W90x900 architecture, which we do not
support.

– ath9k: protect tid->sched check (bnc#871148,CVE-2014-2672).

– Update ec2 config files: disable CONFIG_INPUT_FF_MEMLESS This helper
module is useless on EC2.

– SELinux: Fix kernel BUG on empty security contexts
(bnc#863335,CVE-2014-1874).

– hamradio/yam: fix info leak in ioctl (bnc#858872,CVE-2014-1446).

– netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
(bnc#868653 CVE-2014-2523).

– ath9k_htc: properly set MAC address and BSSID mask
(bnc#851426,CVE-2013-4579).

– drm/ttm: don’t oops if no invalidate_caches() (bnc#869414).

– Btrfs: do not bug_on if we try to cow a free space cache inode
(bnc#863235).

– Update vanilla config files: enable console rotation It’s enabled in all
other kernel flavors so it should be enabled in vanilla too.

– Update config files. (CONFIG_EFIVAR_FS=m) Due to systemd can auto-load
efivarfs.ko, so wet CONFIG_EFIVAR_FS to module on x86_64.

– libata, freezer: avoid block device removal while system is frozen
(bnc#849334).

– Enable CONFIG_IRDA_FAST_RR=y (bnc#860502)

– [media] bttv: don’t setup the controls if there are no video devices
(bnc#861750).

– drm/i915/dp: add native aux defer retry limit (bnc#867718).
– drm/i915/dp: increase native aux defer retry timeout (bnc#867718).

– rpc_pipe: fix cleanup of dummy gssd directory when notification fails
(bnc#862746).
– sunrpc: add an “info” file for the dummy gssd pipe (bnc#862746).
– rpc_pipe: remove the clntXX dir if creating the pipe fails (bnc#862746).

– Delete rpm/_constraints after mismerge

Sat Mar 8 00:41:07 CET 2014 – jbohac@suse.cz

– Refresh
patches.fixes/tcp-syncookies-reduce-cookie-lifetime-to-128-seconds.patch.

– tcp: syncookies: reduce cookie lifetime to 128 seconds (bnc#833968).
– tcp: syncookies: reduce mss table to four values (bnc#833968).

– rpm/mkspec: Generate a per-architecture per-package _constraints file

– rpm/mkspec: Remove dead code

– Refresh patches.fixes/rtc-cmos-add-an-alarm-disable-quirk.patch.

– rtc-cmos: Add an alarm disable quirk (bnc#812592).
– Refresh patches.xen/xen-x86-EFI.

– Refresh
patches.apparmor/apparmor-compatibility-patch-for-v5-network-control.
patches.drivers/pstore_disable_efi_backend_by_default.patch.
patches.fixes/dm-table-switch-to-readonly.
patches.fixes/kvm-ioapic.patch. patches.fixes/kvm-macos.patch.
patches.fixes/remount-no-shrink-dcache.
patches.fixes/scsi-dh-queuedata-accessors.
patches.suse/0001-vfs-Hooks-for-more-fine-grained-directory-permission.patc
h. patches.suse/ovl01-vfs-add-i_op-dentry_open.patch.
patches.suse/sd_init.mark_majors_busy.patch.

– rpm/mkspec: Fix whitespace in NoSource lines

– rpm/kernel-binary.spec.in: Do not zero modules.dep before using it
(bnc#866075)

– rpm/kernel-obs-build.spec: Drop useless ExclusiveArch statement

– Update config files. Set CONFIG_EFIVAR_FS to build-in for MOK support
Update config files. Set CONFIG_EFIVAR_FS to build-in for MOK support

– nfs: always make sure page is up-to-date before extending a write to
cover the entire page (bnc#864867 bnc#865075).

– x86, cpu, amd: Add workaround for family 16h, erratum 793 (bnc#852967
CVE-2013-6885).
– Refresh patches.xen/xen3-patch-3.10.

– cifs: ensure that uncached writes handle unmapped areas correctly
(bnc#864025 CVE-2014-00691).

– x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround (bnc#858638
CVE-2014-1438).

– rpm/kernel-obs-build.spec: Do not mount /sys, the build script does it

– Update config files: Disable TS5500-specific drivers These drivers are
useless without TS5500 board support: mtd-ts5500, gpio-ts5500 and max197.

– balloon: don’t crash in HVM-with-PoD guests.
– usbback: fix after c/s 1232:8806dfb939d4 (bnc#842553).
– hwmon: (coretemp) Fix truncated name of alarm attributes.

– rpm/kernel-obs-build.spec: Fix for ppc64le

– Scripts: .nosrc.rpm should contain only the specfile (bnc #639379)

– config: update arm7hl/exynos
– Enhances exynos support:
* Add USB support
* Add sound support
* Add devices (accelerometer, etc.) on arndale board

– drm/cirrus: Fix cirrus drm driver for fbdev + qemu (bnc#856760).

– Spec: zeroing modules.dep to get identical builds among different
machines

– doc/README.SUSE: Update to match the current package layout

– Add the README.SUSE file to the packaging branch

– lockd: send correct lock when granting a delayed lock (bnc#859342).

– mm/page-writeback.c: do not count anon pages as dirtyable memory
(reclaim stalls).
– mm/page-writeback.c: fix dirty_balance_reserve subtraction from
dirtyable memory (reclaim stalls).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE 13.1:

zypper in -t patch openSUSE-2014-375

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE 13.1 (i586 x86_64):

cloop-2.639-11.7.1
cloop-debuginfo-2.639-11.7.1
cloop-debugsource-2.639-11.7.1
cloop-kmp-default-2.639_k3.11.10_11-11.7.1
cloop-kmp-default-debuginfo-2.639_k3.11.10_11-11.7.1
cloop-kmp-desktop-2.639_k3.11.10_11-11.7.1
cloop-kmp-desktop-debuginfo-2.639_k3.11.10_11-11.7.1
cloop-kmp-xen-2.639_k3.11.10_11-11.7.1
cloop-kmp-xen-debuginfo-2.639_k3.11.10_11-11.7.1
crash-7.0.2-2.7.1
crash-debuginfo-7.0.2-2.7.1
crash-debugsource-7.0.2-2.7.1
crash-devel-7.0.2-2.7.1
crash-doc-7.0.2-2.7.1
crash-eppic-7.0.2-2.7.1
crash-eppic-debuginfo-7.0.2-2.7.1
crash-gcore-7.0.2-2.7.1
crash-gcore-debuginfo-7.0.2-2.7.1
crash-kmp-default-7.0.2_k3.11.10_11-2.7.1
crash-kmp-default-debuginfo-7.0.2_k3.11.10_11-2.7.1
crash-kmp-desktop-7.0.2_k3.11.10_11-2.7.1
crash-kmp-desktop-debuginfo-7.0.2_k3.11.10_11-2.7.1
crash-kmp-xen-7.0.2_k3.11.10_11-2.7.1
crash-kmp-xen-debuginfo-7.0.2_k3.11.10_11-2.7.1
hdjmod-debugsource-1.28-16.7.1
hdjmod-kmp-default-1.28_k3.11.10_11-16.7.1
hdjmod-kmp-default-debuginfo-1.28_k3.11.10_11-16.7.1
hdjmod-kmp-desktop-1.28_k3.11.10_11-16.7.1
hdjmod-kmp-desktop-debuginfo-1.28_k3.11.10_11-16.7.1
hdjmod-kmp-xen-1.28_k3.11.10_11-16.7.1
hdjmod-kmp-xen-debuginfo-1.28_k3.11.10_11-16.7.1
ipset-6.19-2.7.1
ipset-debuginfo-6.19-2.7.1
ipset-debugsource-6.19-2.7.1
ipset-devel-6.19-2.7.1
ipset-kmp-default-6.19_k3.11.10_11-2.7.1
ipset-kmp-default-debuginfo-6.19_k3.11.10_11-2.7.1
ipset-kmp-desktop-6.19_k3.11.10_11-2.7.1
ipset-kmp-desktop-debuginfo-6.19_k3.11.10_11-2.7.1
ipset-kmp-xen-6.19_k3.11.10_11-2.7.1
ipset-kmp-xen-debuginfo-6.19_k3.11.10_11-2.7.1
iscsitarget-1.4.20.3-13.7.1
iscsitarget-debuginfo-1.4.20.3-13.7.1
iscsitarget-debugsource-1.4.20.3-13.7.1
iscsitarget-kmp-default-1.4.20.3_k3.11.10_11-13.7.1
iscsitarget-kmp-default-debuginfo-1.4.20.3_k3.11.10_11-13.7.1
iscsitarget-kmp-desktop-1.4.20.3_k3.11.10_11-13.7.1
iscsitarget-kmp-desktop-debuginfo-1.4.20.3_k3.11.10_11-13.7.1
iscsitarget-kmp-xen-1.4.20.3_k3.11.10_11-13.7.1
iscsitarget-kmp-xen-debuginfo-1.4.20.3_k3.11.10_11-13.7.1
kernel-default-3.11.10-11.1
kernel-default-base-3.11.10-11.1
kernel-default-base-debuginfo-3.11.10-11.1
kernel-default-debuginfo-3.11.10-11.1
kernel-default-debugsource-3.11.10-11.1
kernel-default-devel-3.11.10-11.1
kernel-default-devel-debuginfo-3.11.10-11.1
kernel-syms-3.11.10-11.1
libipset3-6.19-2.7.1
libipset3-debuginfo-6.19-2.7.1
ndiswrapper-1.58-7.1
ndiswrapper-debuginfo-1.58-7.1
ndiswrapper-debugsource-1.58-7.1
ndiswrapper-kmp-default-1.58_k3.11.10_11-7.1
ndiswrapper-kmp-default-debuginfo-1.58_k3.11.10_11-7.1
ndiswrapper-kmp-desktop-1.58_k3.11.10_11-7.1
ndiswrapper-kmp-desktop-debuginfo-1.58_k3.11.10_11-7.1
openvswitch-1.11.0-0.25.1
openvswitch-controller-1.11.0-0.25.1
openvswitch-controller-debuginfo-1.11.0-0.25.1
openvswitch-debuginfo-1.11.0-0.25.1
openvswitch-debugsource-1.11.0-0.25.1
openvswitch-kmp-default-1.11.0_k3.11.10_11-0.25.1
openvswitch-kmp-default-debuginfo-1.11.0_k3.11.10_11-0.25.1
openvswitch-kmp-desktop-1.11.0_k3.11.10_11-0.25.1
openvswitch-kmp-desktop-debuginfo-1.11.0_k3.11.10_11-0.25.1
openvswitch-kmp-xen-1.11.0_k3.11.10_11-0.25.1
openvswitch-kmp-xen-debuginfo-1.11.0_k3.11.10_11-0.25.1
openvswitch-pki-1.11.0-0.25.1
openvswitch-switch-1.11.0-0.25.1
openvswitch-switch-debuginfo-1.11.0-0.25.1
openvswitch-test-1.11.0-0.25.1
pcfclock-0.44-258.7.1
pcfclock-debuginfo-0.44-258.7.1
pcfclock-debugsource-0.44-258.7.1
pcfclock-kmp-default-0.44_k3.11.10_11-258.7.1
pcfclock-kmp-default-debuginfo-0.44_k3.11.10_11-258.7.1
pcfclock-kmp-desktop-0.44_k3.11.10_11-258.7.1
pcfclock-kmp-desktop-debuginfo-0.44_k3.11.10_11-258.7.1
python-openvswitch-1.11.0-0.25.1
python-openvswitch-test-1.11.0-0.25.1
python-virtualbox-4.2.18-2.12.1
python-virtualbox-debuginfo-4.2.18-2.12.1
virtualbox-4.2.18-2.12.1
virtualbox-debuginfo-4.2.18-2.12.1
virtualbox-debugsource-4.2.18-2.12.1
virtualbox-devel-4.2.18-2.12.1
virtualbox-guest-kmp-default-4.2.18_k3.11.10_11-2.12.1
virtualbox-guest-kmp-default-debuginfo-4.2.18_k3.11.10_11-2.12.1
virtualbox-guest-kmp-desktop-4.2.18_k3.11.10_11-2.12.1
virtualbox-guest-kmp-desktop-debuginfo-4.2.18_k3.11.10_11-2.12.1
virtualbox-guest-tools-4.2.18-2.12.1
virtualbox-guest-tools-debuginfo-4.2.18-2.12.1
virtualbox-guest-x11-4.2.18-2.12.1
virtualbox-guest-x11-debuginfo-4.2.18-2.12.1
virtualbox-host-kmp-default-4.2.18_k3.11.10_11-2.12.1
virtualbox-host-kmp-default-debuginfo-4.2.18_k3.11.10_11-2.12.1
virtualbox-host-kmp-desktop-4.2.18_k3.11.10_11-2.12.1
virtualbox-host-kmp-desktop-debuginfo-4.2.18_k3.11.10_11-2.12.1
virtualbox-qt-4.2.18-2.12.1
virtualbox-qt-debuginfo-4.2.18-2.12.1
virtualbox-websrv-4.2.18-2.12.1
virtualbox-websrv-debuginfo-4.2.18-2.12.1
xen-debugsource-4.3.2_01-15.1
xen-devel-4.3.2_01-15.1
xen-kmp-default-4.3.2_01_k3.11.10_11-15.1
xen-kmp-default-debuginfo-4.3.2_01_k3.11.10_11-15.1
xen-kmp-desktop-4.3.2_01_k3.11.10_11-15.1
xen-kmp-desktop-debuginfo-4.3.2_01_k3.11.10_11-15.1
xen-libs-4.3.2_01-15.1
xen-libs-debuginfo-4.3.2_01-15.1
xen-tools-domU-4.3.2_01-15.1
xen-tools-domU-debuginfo-4.3.2_01-15.1
xtables-addons-2.3-2.7.1
xtables-addons-debuginfo-2.3-2.7.1
xtables-addons-debugsource-2.3-2.7.1
xtables-addons-kmp-default-2.3_k3.11.10_11-2.7.1
xtables-addons-kmp-default-debuginfo-2.3_k3.11.10_11-2.7.1
xtables-addons-kmp-desktop-2.3_k3.11.10_11-2.7.1
xtables-addons-kmp-desktop-debuginfo-2.3_k3.11.10_11-2.7.1
xtables-addons-kmp-xen-2.3_k3.11.10_11-2.7.1
xtables-addons-kmp-xen-debuginfo-2.3_k3.11.10_11-2.7.1

– openSUSE 13.1 (i686 x86_64):

kernel-debug-3.11.10-11.1
kernel-debug-base-3.11.10-11.1
kernel-debug-base-debuginfo-3.11.10-11.1
kernel-debug-debuginfo-3.11.10-11.1
kernel-debug-debugsource-3.11.10-11.1
kernel-debug-devel-3.11.10-11.1
kernel-debug-devel-debuginfo-3.11.10-11.1
kernel-desktop-3.11.10-11.1
kernel-desktop-base-3.11.10-11.1
kernel-desktop-base-debuginfo-3.11.10-11.1
kernel-desktop-debuginfo-3.11.10-11.1
kernel-desktop-debugsource-3.11.10-11.1
kernel-desktop-devel-3.11.10-11.1
kernel-desktop-devel-debuginfo-3.11.10-11.1
kernel-ec2-3.11.10-11.1
kernel-ec2-base-3.11.10-11.1
kernel-ec2-base-debuginfo-3.11.10-11.1
kernel-ec2-debuginfo-3.11.10-11.1
kernel-ec2-debugsource-3.11.10-11.1
kernel-ec2-devel-3.11.10-11.1
kernel-ec2-devel-debuginfo-3.11.10-11.1
kernel-trace-3.11.10-11.1
kernel-trace-base-3.11.10-11.1
kernel-trace-base-debuginfo-3.11.10-11.1
kernel-trace-debuginfo-3.11.10-11.1
kernel-trace-debugsource-3.11.10-11.1
kernel-trace-devel-3.11.10-11.1
kernel-trace-devel-debuginfo-3.11.10-11.1
kernel-vanilla-3.11.10-11.1
kernel-vanilla-debuginfo-3.11.10-11.1
kernel-vanilla-debugsource-3.11.10-11.1
kernel-vanilla-devel-3.11.10-11.1
kernel-vanilla-devel-debuginfo-3.11.10-11.1
kernel-xen-3.11.10-11.1
kernel-xen-base-3.11.10-11.1
kernel-xen-base-debuginfo-3.11.10-11.1
kernel-xen-debuginfo-3.11.10-11.1
kernel-xen-debugsource-3.11.10-11.1
kernel-xen-devel-3.11.10-11.1
kernel-xen-devel-debuginfo-3.11.10-11.1

– openSUSE 13.1 (x86_64):

xen-4.3.2_01-15.1
xen-doc-html-4.3.2_01-15.1
xen-libs-32bit-4.3.2_01-15.1
xen-libs-debuginfo-32bit-4.3.2_01-15.1
xen-tools-4.3.2_01-15.1
xen-tools-debuginfo-4.3.2_01-15.1
xen-xend-tools-4.3.2_01-15.1
xen-xend-tools-debuginfo-4.3.2_01-15.1

– openSUSE 13.1 (noarch):

kernel-devel-3.11.10-11.1
kernel-docs-3.11.10-11.3
kernel-source-3.11.10-11.1
kernel-source-vanilla-3.11.10-11.1

– openSUSE 13.1 (i686):

kernel-pae-3.11.10-11.1
kernel-pae-base-3.11.10-11.1
kernel-pae-base-debuginfo-3.11.10-11.1
kernel-pae-debuginfo-3.11.10-11.1
kernel-pae-debugsource-3.11.10-11.1
kernel-pae-devel-3.11.10-11.1
kernel-pae-devel-debuginfo-3.11.10-11.1

– openSUSE 13.1 (i586):

cloop-kmp-pae-2.639_k3.11.10_11-11.7.1
cloop-kmp-pae-debuginfo-2.639_k3.11.10_11-11.7.1
crash-kmp-pae-7.0.2_k3.11.10_11-2.7.1
crash-kmp-pae-debuginfo-7.0.2_k3.11.10_11-2.7.1
hdjmod-kmp-pae-1.28_k3.11.10_11-16.7.1
hdjmod-kmp-pae-debuginfo-1.28_k3.11.10_11-16.7.1
ipset-kmp-pae-6.19_k3.11.10_11-2.7.1
ipset-kmp-pae-debuginfo-6.19_k3.11.10_11-2.7.1
iscsitarget-kmp-pae-1.4.20.3_k3.11.10_11-13.7.1
iscsitarget-kmp-pae-debuginfo-1.4.20.3_k3.11.10_11-13.7.1
ndiswrapper-kmp-pae-1.58_k3.11.10_11-7.1
ndiswrapper-kmp-pae-debuginfo-1.58_k3.11.10_11-7.1
openvswitch-kmp-pae-1.11.0_k3.11.10_11-0.25.1
openvswitch-kmp-pae-debuginfo-1.11.0_k3.11.10_11-0.25.1
pcfclock-kmp-pae-0.44_k3.11.10_11-258.7.1
pcfclock-kmp-pae-debuginfo-0.44_k3.11.10_11-258.7.1
virtualbox-guest-kmp-pae-4.2.18_k3.11.10_11-2.12.1
virtualbox-guest-kmp-pae-debuginfo-4.2.18_k3.11.10_11-2.12.1
virtualbox-host-kmp-pae-4.2.18_k3.11.10_11-2.12.1
virtualbox-host-kmp-pae-debuginfo-4.2.18_k3.11.10_11-2.12.1
xen-kmp-pae-4.3.2_01_k3.11.10_11-15.1
xen-kmp-pae-debuginfo-4.3.2_01_k3.11.10_11-15.1
xtables-addons-kmp-pae-2.3_k3.11.10_11-2.7.1
xtables-addons-kmp-pae-debuginfo-2.3_k3.11.10_11-2.7.1

References:

http://support.novell.com/security/cve/CVE-2013-4579.html
http://support.novell.com/security/cve/CVE-2013-6885.html
http://support.novell.com/security/cve/CVE-2013-7263.html
http://support.novell.com/security/cve/CVE-2013-7264.html
http://support.novell.com/security/cve/CVE-2013-7265.html
http://support.novell.com/security/cve/CVE-2013-7281.html
http://support.novell.com/security/cve/CVE-2014-0069.html
http://support.novell.com/security/cve/CVE-2014-0101.html
http://support.novell.com/security/cve/CVE-2014-0196.html
http://support.novell.com/security/cve/CVE-2014-1438.html
http://support.novell.com/security/cve/CVE-2014-1446.html
http://support.novell.com/security/cve/CVE-2014-1690.html
http://support.novell.com/security/cve/CVE-2014-1737.html
http://support.novell.com/security/cve/CVE-2014-1738.html
http://support.novell.com/security/cve/CVE-2014-1874.html
http://support.novell.com/security/cve/CVE-2014-2523.html
http://support.novell.com/security/cve/CVE-2014-2672.html
https://bugzilla.novell.com/639379
https://bugzilla.novell.com/812592
https://bugzilla.novell.com/81660
https://bugzilla.novell.com/821619
https://bugzilla.novell.com/833968
https://bugzilla.novell.com/842553
https://bugzilla.novell.com/849334
https://bugzilla.novell.com/851244
https://bugzilla.novell.com/851426
https://bugzilla.novell.com/852656
https://bugzilla.novell.com/852967
https://bugzilla.novell.com/853350
https://bugzilla.novell.com/856760
https://bugzilla.novell.com/857643
https://bugzilla.novell.com/858638
https://bugzilla.novell.com/858872
https://bugzilla.novell.com/859342
https://bugzilla.novell.com/860502
https://bugzilla.novell.com/860835
https://bugzilla.novell.com/861750
https://bugzilla.novell.com/862746
https://bugzilla.novell.com/863235
https://bugzilla.novell.com/863335
https://bugzilla.novell.com/864025
https://bugzilla.novell.com/864867
https://bugzilla.novell.com/865075
https://bugzilla.novell.com/866075
https://bugzilla.novell.com/866102
https://bugzilla.novell.com/867718
https://bugzilla.novell.com/868653
https://bugzilla.novell.com/869414
https://bugzilla.novell.com/871148
https://bugzilla.novell.com/871160
https://bugzilla.novell.com/871252
https://bugzilla.novell.com/871325
https://bugzilla.novell.com/875440
https://bugzilla.novell.com/875690
https://bugzilla.novell.com/875798
https://bugzilla.novell.com/876531
https://bugzilla.novell.com/876699


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorMarko Stanec
Cert idNCERT-REF-2014-05-0045-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni propust programskog paketa iTunes

Otkriven je sigurnosni propust u paketu iTunes za Mac OS X. Propust se očitovao postavljenjem "world-writable" dozvola za direktorij "/Users...

Close