SUSE Security Announcement: kernel (SUSE-SA:2006:028)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ SUSE Security Announcement Package: kernel Announcement ID: SUSE-SA:2006:028 Date: Wed, 31 May 2006 18:00:00 +0000 Affected Products: SUSE LINUX 10.0 SUSE LINUX 9.3 SUSE LINUX 9.2 SUSE LINUX 9.1 SuSE Linux Desktop 1.0 SuSE Linux Enterprise Server 8 SUSE SLES 9 UnitedLinux 1.0 Vulnerability Type: remote denial of service Severity (1-10): 7 SUSE Default Package: yes Cross-References: CVE-2005-4798, CVE-2006-0095, CVE-2006-0457 CVE-2006-0554, CVE-2006-0555, CVE-2006-0557 CVE-2006-0741, CVE-2006-0742, CVE-2006-0744 CVE-2006-1055, CVE-2006-1056, CVE-2006-1242 CVE-2006-1342, CVE-2006-1523, CVE-2006-1524 CVE-2006-1525, CVE-2006-1527, CVE-2006-1863 CVE-2006-1864, CVE-2006-2271, CVE-2006-2272 CVE-2006-2274 Content of This Advisory: 1) Security Vulnerability Resolved: various kernel security problems Problem Description 2) Solution or Work-Around 3) Special Instructions and Notes 4) Package Location and Checksums 5) Pending Vulnerabilities, Solutions, and Work-Arounds: See SUSE Security Summary Report. 6) Authenticity Verification and Additional Information ______________________________________________________________________________ 1) Problem Description and Brief Discussion The Linux kernel has been updated to fix various security problems, listed below. Note that some of the updates have already been released end of last week. - AppArmor in SUSE Linux 10.0 and SUSE Linux Enterprise Server 9 SP3 could crash the machine by an negative dentry reference due to for instance vanishing path component during a system call of a profiled application. - AppArmor in SUSE Linux 10.0 and SUSE Linux Enterprise Server 9 SP3 failed to prevent PTRACE_ME on a confined parent, allowing an infected called program to gain the same rights as its parent process. - CVE-2006-2274: Linux SCTP allows remote attackers to cause a denial of service (infinite recursion and crash) via a packet that contains two or more DATA fragments, which causes an skb pointer to refer back to itself when the full message is reassembled, leading to infinite recursion in the sctp_skb_pull function. - CVE-2006-2272: Linux SCTP allowed remote attackers to cause a denial of service (kernel panic) via incoming IP fragmented (1) COOKIE_ECHO and (2) HEARTBEAT SCTP control chunks. - CVE-2006-2271: The ECNE chunk handling in Linux SCTP allowed remote attackers to cause a denial of service (kernel panic) via an unexpected chunk when the session is in CLOSED state. - CVE-2006-1864: Due to incorrect argument checking it was possible to break out of chroots on smbfs file systems. - CVE-2006-1863: Due to incorrect argument checking it was possible to break out of chroots on cifs file systems. - CVE-2006-1527: NETFILTER SCTP conntrack: Fixed an infinite loop in sctp handling, which could be caused by a remote attacker. - CVE-2006-1525: IPV4: Fixed a machine crash in ip_route_input that could be triggered via the "route" command from local attackers. - CVE-2006-1524: shmat: stop mprotect from giving write permission to a read-only shared memory attachment. - CVE-2006-1523: __group_complete_signal: Removed a bogus BUG_ON which could lead to unwanted process crashes. - CVE-2006-1342: A minor information leak in SO_ORIGINAL_DST was fixed. - CVE-2006-1242: Fix IPv4 IPID generation to avoid possible idle scans against the machine. - CVE-2006-1056: i386/x86-64: Fix AMD x87 information leak between processes. - CVE-2006-1055: sysfs: Zero terminate sysfs write buffers. - CVE-2006-0744: When the user could have changed %RIP always force IRET. - CVE-2006-0742: IA64 only: Don't declare die_if_kernel as noreturn, otherwise local attackers can crash the machine. - CVE-2006-0741: x86_64 only: Always check that RIPs are canonical during signal handling, otherwise local attackers could crash the machine. - CVE-2006-0557: Add an upper boundary to mempolicy node arguments to avoid potentially local crashes. - CVE-2006-0555: A normal user was able to panic the NFS client with direct I/O. - CVE-2006-0554: A XFS ftruncate() bug could expose stale data. - CVE-2006-0457: A race condition in the add_key, request_key, and keyctl functions allows local users to cause a denial of service (crash) or read sensitive kernel memory by modifying the length of a string argument between the time that the kernel calculates the length and when it copies the data into kernel memory. (Please Note that keyctls are not enabled in SUSE Linux up to 10.0). - CVE-2006-0095: dm-crypt: Zero key before freeing it to avoid leakage. - CVE-2005-4798: Creation of long symlinks on the NFS server could crash the client machine. Additionally some non security bug fixes include: - Lots of bugfixes in the SUSE Linux Enterprise 9 and SUSE Linux 9.1 kernel. - The S/390 tape driver is now opensource and the previous oco drivers are no longer supported. 2) Solution or Work-Around There is no known workaround, please install the update packages. 3) Special Instructions and Notes SPECIAL INSTALLATION INSTRUCTIONS ================================= The following paragraphs guide you through the installation process in a step-by-step fashion. The character sequence "****" marks the beginning of a new paragraph. In some cases, the steps outlined in a particular paragraph may or may not be applicable to your situation. Therefore, make sure that you read through all of the steps below before attempting any of these procedures. All of the commands that need to be executed must be run as the superuser 'root'. Each step relies on the steps before it to complete successfully. **** Step 1: Determine the needed kernel type. Use the following command to determine which kind of kernel is installed on your system: rpm -qf --qf '%{name}\n' /boot/vmlinuz **** Step 2: Download the packages for your system. Download the kernel RPM package for your distribution with the name indicated by Step 1. Starting from SUSE LINUX 9.2, kernel modules that are not free were moved to a separate package with the suffix '-nongpl' in its name. Download that package as well if you rely on hardware that requires non-free drivers, such as some ISDN adapters. The list of all kernel RPM packages is appended below. The kernel-source package does not contain a binary kernel in bootable form. Instead, it contains the sources that correspond with the binary kernel RPM packages. This package is required to build third party add-on modules. **** Step 3: Verify authenticity of the packages. Verify the authenticity of the kernel RPM package using the methods as listed in Section 6 of this SUSE Security Announcement. **** Step 4: Installing your kernel rpm package. Install the rpm package that you have downloaded in Step 2 with the command rpm -Uhv <FILE> replacing <FILE> with the filename of the RPM package downloaded. Warning: After performing this step, your system may not boot unless the following steps have been followed completely. **** Step 5: Configuring and creating the initrd. The initrd is a RAM disk that is loaded into the memory of your system together with the kernel boot image by the boot loader. The kernel uses the content of this RAM disk to execute commands that must be run before the kernel can mount its root file system. The initrd is typically used to load hard disk controller drivers and file system modules. The variable INITRD_MODULES in /etc/sysconfig/kernel determines which kernel modules are loaded in the initrd. After a new kernel rpm has been installed, the initrd must be recreated to include the updated kernel modules. Usually this happens automatically when installing the kernel rpm. If creating the initrd fails for some reason, manually run the command /sbin/mkinitrd **** Step 6: Update the boot loader, if necessary. Depending on your software configuration, you either have the LILO or GRUB boot loader installed and initialized on your system. Use the command grep LOADER_TYPE /etc/sysconfig/bootloader to find out which boot loader is configured. The GRUB boot loader does not require any further action after a new kernel has been installed. You may proceed to the next step if you are using GRUB. If you use the LILO boot loader, lilo must be run to reinitialize the boot sector of the hard disk. Usually this happens automatically when installing the kernel RPM. In case this step fails, run the command /sbin/lilo Warning: An improperly installed boot loader will render your system unbootable. **** Step 7: Reboot. If all of the steps above have been successfully completed on your system, the new kernel including the kernel modules and the initrd are ready to boot. The system needs to be rebooted for the changes to be active. Make sure that all steps have been completed then reboot using the command /sbin/shutdown -r now Your system will now shut down and restart with the new kernel. 4) Package Location and Checksums The preferred method for installing security updates is to use the YaST Online Update (YOU) tool. YOU detects which updates are required and automatically performs the necessary steps to verify and install them. Alternatively, download the update packages for your distribution manually and verify their integrity by the methods listed in Section 6 of this announcement. Then install the packages using the command rpm -Fhv <file.rpm> to apply the update, replacing <file.rpm> with the filename of the downloaded RPM package. x86 Platform: SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/Intel-536ep-4.69-14.5.i586.rpm 3a83b6b2ac93a33ccbef968f91ea1599 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-2.6.13-15.10.i586.rpm 82d114ebbb80523fcc9c772f15f5bf59 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-nongpl-2.6.13-15.10.i586.rpm 00b0c272a99a222cdaa8ed2932ed4e72 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-2.6.13-15.10.i586.rpm 9b6a9c3f4b6e848a22032d6aa60e01ed ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-nongpl-2.6.13-15.10.i586.rpm cd834d6bfffe716eb0ba7f65835da3b3 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-2.6.13-15.10.i586.rpm 6b6a48bdd2acaae2a17006a3266ceb1d ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-nongpl-2.6.13-15.10.i586.rpm 08a960b9f08a18b70cf932ed49bce39c ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-source-2.6.13-15.10.i586.rpm f5439ee02ca40c4fb123d15a43082390 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-syms-2.6.13-15.10.i586.rpm 50556d3b9f06e2a850f16cc37260ae02 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-2.6.13-15.10.i586.rpm 5546aa0f75ac02c60a98c8530182b125 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-nongpl-2.6.13-15.10.i586.rpm 4379e54d1bb5da4a0145f18e15a50ebe ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-2.6.13-15.10.i586.rpm 4a6b8022c5e785ab2da2be4a872baf52 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-nongpl-2.6.13-15.10.i586.rpm 5c0566baf35363ca22af29bd61bc6117 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/um-host-kernel-2.6.13-15.10.i586.rpm 15b889451fd0837cd117c9e4b7adf1ab SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/Intel-536ep-4.69-10.6.i586.rpm 2410d834eab16f1626457bb02b2a1a74 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-2.6.11.4-21.12.i586.rpm 92d05ecd1c3b69768129ec48f857003c ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-nongpl-2.6.11.4-21.12.i586.rpm c7d85941249af8919e53fb114f64d9ab ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-2.6.11.4-21.12.i586.rpm 2ca07b757a0ecbdc2ae162fdbb74fe84 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-nongpl-2.6.11.4-21.12.i586.rpm abe9aef7428dcae8d4cb6e10e9160250 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-2.6.11.4-21.12.i586.rpm d2881e4ce268834485cc6109d0f053c3 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-nongpl-2.6.11.4-21.12.i586.rpm 48c6295b8f68d5c80a9f3fbeef1edcc3 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-source-2.6.11.4-21.12.i586.rpm a564139b3c87831391474cb9c745ab52 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-syms-2.6.11.4-21.12.i586.rpm fce134e65cf241b2c41051af535f9fa5 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-2.6.11.4-21.12.i586.rpm 174c52764d54f03a47406d0a01370e25 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-nongpl-2.6.11.4-21.12.i586.rpm 4e0495322a4b2f38da8265df47051c43 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-2.6.11.4-21.12.i586.rpm 072e3bf41cab06360bd87c30bfb0b15a ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-nongpl-2.6.11.4-21.12.i586.rpm 1a644cf0d30553f845c44767d009e8d2 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/ltmodem-8.31a10-7.6.i586.rpm af5d6fdbcdcf67b15780cfabd6bde63d ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-install-initrd-1.0-50.6.i586.rpm eb1ec5422e5dda9558fa8367ff042901 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-kernel-2.6.11.4-21.12.i586.rpm 5b7745b79e8bd19e42d68628889daa1a SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/Intel-536ep-4.69-5.14.i586.rpm b117fe5ca34185091a50c7f2bf17b8c5 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-2.6.8-24.21.i586.rpm e6fcd60b751a8811fe3264a5423dddf4 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-nongpl-2.6.8-24.21.i586.rpm fe6b529d2ede5d43301db7a8ab12f9bf ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-2.6.8-24.21.i586.rpm 30f59434537cee4176b2511ed2875184 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-nongpl-2.6.8-24.21.i586.rpm ef6a69c4982c498bf4f2855a75047f38 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-2.6.8-24.21.i586.rpm a3f3ce1148b2f94997108da61ab640a8 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-nongpl-2.6.8-24.21.i586.rpm 56791a070623ab550e71a14ee329a412 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-source-2.6.8-24.21.i586.rpm cead4b081e6a01e0848ec26f652c9b8a ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-syms-2.6.8-24.21.i586.rpm c4e9b67ee0740d86e1565c3aaa4ac250 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-2.6.8-24.21.i586.rpm 854c60aea3df5d4671bf8d902d842214 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-nongpl-2.6.8-24.21.i586.rpm e5e1fdcfb20887ca944be07e1ffd5835 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/ltmodem-8.31a8-6.14.i586.rpm ffe2733bb885439897af61680dfa386d ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-install-initrd-1.0-48.13.i586.rpm ddbb39bfa6ddec0079e57fb378465346 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-kernel-2.6.8-24.21.i586.rpm f98c69a01d4a93d1e3f7eb4a0f81a481 SUSE LINUX 9.1: ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6.5-7.257.i586.rpm d19076aa179801c307fd137ebe10900f ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2.6.5-7.257.i586.rpm 4a25e927ab95b0173cfafa394f91f207 ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.5-7.257.i586.rpm 677290d102ac4b238f7c6dd12808f554 ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-source-2.6.5-7.257.i586.rpm fadc7d71a944ad5e1c3857cc0910cde1 ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.5-7.257.i586.rpm 7aeeb6366b2528975004d21e17e1453e ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/ltmodem-2.6.2-38.23.i586.rpm 93611206083c3d867d7f8e697e0b9683 Platform Independent: SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/noarch/kernel-docs-2.6.11.4-21.12.noarch.rpm c2c3264f47360840d988a878845e0280 SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/noarch/kernel-docs-2.6.8-24.21.noarch.rpm 0c39c810d06835f4e4b4ba3b5283d5e3 SUSE LINUX 9.1: ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.257.noarch.rpm e5c63b4d0d11b19d198b08646c2bfa89 ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.257.noarch.rpm ec17f895636cda948927ca6a37e5f990 Power PC Platform: SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-default-2.6.13-15.10.ppc.rpm 063b606929bec2b369675009b654c2b3 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-iseries64-2.6.13-15.10.ppc.rpm ae9e7b8c030d846dbebd2185d6dc233d ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-ppc64-2.6.13-15.10.ppc.rpm 922320a95ab56d93147306c6f2a1a0b5 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-source-2.6.13-15.10.ppc.rpm ff773fb617e428ad9cb8ccf9e8acccfb ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-syms-2.6.13-15.10.ppc.rpm 3853da634e2914f6952fbf7378ee050a x86-64 Platform: SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-2.6.13-15.10.x86_64.rpm f6743cde2b350ff70eb251c855515702 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-nongpl-2.6.13-15.10.x86_64.rpm 074b1a8d73ddad88067690c46bddddb4 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-2.6.13-15.10.x86_64.rpm 268b29a0654711992b9583e8528d175a ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-nongpl-2.6.13-15.10.x86_64.rpm f6986f14c6f800b7794569b9543f4ffa ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-source-2.6.13-15.10.x86_64.rpm 696e7f31a7269890f44338b9c81e8614 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-syms-2.6.13-15.10.x86_64.rpm d2a85c7eba759d921ceb760b670e24d4 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-2.6.13-15.10.x86_64.rpm d1a572732edce8d2163b84d9eb2a6151 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-nongpl-2.6.13-15.10.x86_64.rpm ebbadcab9a3b67e58e430a6819c8214d SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-2.6.11.4-21.12.x86_64.rpm 26fd19dd2b4b76545cb9a2d7d1206980 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-nongpl-2.6.11.4-21.12.x86_64.rpm ff1adebf486711688f6d8ec25a2c8442 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-2.6.11.4-21.12.x86_64.rpm c7b1d557bf3980023d4be44ffb51029b ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-nongpl-2.6.11.4-21.12.x86_64.rpm 66ca05be8638d26d85c5335d8b453770 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-source-2.6.11.4-21.12.x86_64.rpm a4a01f6e186586ab97eb09cf81f8f71c ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-syms-2.6.11.4-21.12.x86_64.rpm ba55d640082d2d2288e4e01f07f9f48e SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-2.6.8-24.21.x86_64.rpm 7598a1386bff406c10732459ad7daf3f ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-nongpl-2.6.8-24.21.x86_64.rpm ee103b10429dbedf672e42a6d783d487 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-2.6.8-24.21.x86_64.rpm b05fceea2901e5519b5c9e97f9a05422 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-nongpl-2.6.8-24.21.x86_64.rpm f1da6bf6bb890f23ec43099beeb8fc33 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-source-2.6.8-24.21.x86_64.rpm a35e63ed009211c0f56b45f2663e9f10 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-syms-2.6.8-24.21.x86_64.rpm 583513d1ae02adb0581331be8caca884 SUSE LINUX 9.1: ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-default-2.6.5-7.257.x86_64.rpm 52a626483d1c45c5083ba02cdce0ccdf ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2.6.5-7.257.x86_64.rpm b4a1fdb2f84017168e646b2b36b46049 ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-source-2.6.5-7.257.x86_64.rpm 7a095385c5f2a11e5c6f277d006d9b60 ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2.6.5-7.257.x86_64.rpm a7d92f0e5fe3a79803b43b8dc32b96be Sources: SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/Intel-536ep-4.69-14.5.src.rpm a7b4d8a829b820bf31b1b7ea8fb515a6 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-bigsmp-2.6.13-15.10.nosrc.rpm b18631694f0c4a90f7998017a0686da0 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-default-2.6.13-15.10.nosrc.rpm 8d41d57e04f90958209039bc0e862152 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-iseries64-2.6.13-15.10.nosrc.rpm 97b6bc393384ea961075ecf3f101fb83 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-ppc64-2.6.13-15.10.nosrc.rpm acdfc8e7aef4da43b4c527efe1df62f3 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-smp-2.6.13-15.10.nosrc.rpm cbcfb3e48d275ed33597314608dd3737 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.10.nosrc.rpm 679f570d3af962b4ba92c69be0128f24 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.10.src.rpm 605aa540269d6c3bee3bee1b7b505301 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-syms-2.6.13-15.10.src.rpm c01dd8279fa7899d8d21d84517aa4459 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-um-2.6.13-15.10.nosrc.rpm bd99426598c23c5cf4952ed9c0b9cfe5 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-xen-2.6.13-15.10.nosrc.rpm 27a2fce49d08338273edf412347450e0 SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/Intel-536ep-4.69-10.6.src.rpm 7a595d7e743780b65db104598cfdb2ca ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-bigsmp-2.6.11.4-21.12.nosrc.rpm aba93f8bf280e9b9508b862e2acd8c26 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-default-2.6.11.4-21.12.nosrc.rpm 2690cdea0a1451ddf39244af68a32f01 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-docs-2.6.11.4-21.12.src.rpm 375c09c4d956c9a90eb1832fe1b0e7ba ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-smp-2.6.11.4-21.12.nosrc.rpm 4e89c3f5123a494a22de9975aabdea64 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-source-2.6.11.4-21.12.src.rpm 829bcfd76fb4bca1a3c6ff4be1c87791 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-syms-2.6.11.4-21.12.src.rpm efbc9e5109781d675df5f24ddae4817d ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-um-2.6.11.4-21.12.nosrc.rpm b23f55072c9d48bc141be9112335ea2f ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-xen-2.6.11.4-21.12.nosrc.rpm 0e7d187812622e4a394e82acb36a137e ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/ltmodem-8.31a10-7.6.src.rpm adbabf2df36f8f6e31bf7fee3a0e3b19 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/um-host-install-initrd-1.0-50.6.src.rpm b30f1abc6f5f589bb96fcfa55b766a23 SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/Intel-536ep-4.69-5.14.src.rpm 2045cdb339052222eb43897c7f6ec68d ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-bigsmp-2.6.8-24.21.nosrc.rpm f57c0c7bfbd3ddb7934d3521e3ad2971 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-default-2.6.8-24.21.nosrc.rpm ad5227e1256c47049b1940cd247bf342 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-docs-2.6.8-24.21.src.rpm 835713dab6b9996a0b504442c5c548fb ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-smp-2.6.8-24.21.nosrc.rpm 5e5d999ec4074533ff8a334f0ceba606 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-source-2.6.8-24.21.src.rpm 5ad0caa2141232a2b6e853ca00c0a542 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-syms-2.6.8-24.21.src.rpm 178da4abc15ce40ef4672f3f90b7b4ff ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-um-2.6.8-24.21.nosrc.rpm a0f46baf2261a7673ad603a31df8105a ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/ltmodem-8.31a8-6.14.src.rpm ccb95498165c64de312f15a854a2bd12 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/um-host-install-initrd-1.0-48.13.src.rpm 5348434281762cd80dee0d2c6fbb48b8 SUSE LINUX 9.1: ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-bigsmp-2.6.5-7.257.nosrc.rpm 2a46b881826169a01adea054ae6910b9 ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-default-2.6.5-7.257.nosrc.rpm fc59f9c8abb4f3fd81bfa6c2a7e875ad ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-docs-2.6.5-7.257.src.rpm 3a5014aed0d55e97b5bcdc5545b1845c ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-smp-2.6.5-7.257.nosrc.rpm 3d9ac7612fa3bb40a7f72bcffd5c8900 ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-source-2.6.5-7.257.src.rpm 1d9002c41679564c5b793f65d82cf15c ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-syms-2.6.5-7.257.src.rpm fb55f67a4cf66887f0046e6759ebc6ce ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/ltmodem-2.6.2-38.23.src.rpm 415ace617e7d083988db2104744dc91f ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-default-2.6.5-7.257.nosrc.rpm 3d6bd83f8ee9c778f391a6422fe227bb ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-docs-2.6.5-7.257.src.rpm a3a395f746078a8c521f7bd7dc8c45c0 ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-smp-2.6.5-7.257.nosrc.rpm 8eaa87737cc95dd9035f4bdcd87c8170 ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-source-2.6.5-7.257.src.rpm a78615451a4cacc0e5c516b67490df17 ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-syms-2.6.5-7.257.src.rpm 5ca629212597b78e740f29ded4541abf Our maintenance customers are notified individually. The packages are offered for installation from the maintenance web: SUSE SLES 9 http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/1c4ff30ff5ed2a2d... SUSE CORE 9 for x86 http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/e793251698757eb4... SuSE Linux Enterprise Server 8 for IBM S/390 and IBM zSeries http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/308356dbd7f8c72f... SUSE SLES 9 for AMD64 and Intel EM64T http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/a85a3e0133108b1c... SUSE SLES 9 for IBM zSeries 64bit http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/d315ac40f92dc387... SUSE CORE 9 for IBM S/390 31bit http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/c7910bbd0cc63477... SUSE SLES 9 for IBM POWER http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/55ecd36eedc87087... SUSE CORE 9 for Itanium Processor Family http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/4a44452b6ec2076b... UnitedLinux 1.0 http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/6d74d9ddf80228eb... http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/4839e281693768ff... http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/7efe4a0df957d96d... SuSE Linux Enterprise Server 8 for IBM zSeries http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/a523f4d26f72bbbc... SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/946c2163106747c7... SuSE Linux Desktop 1.0 http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/ec85d2e9f08af45e... ______________________________________________________________________________ 5) Pending Vulnerabilities, Solutions, and Work-Arounds: See SUSE Security Summary Report. ______________________________________________________________________________ 6) Authenticity Verification and Additional Information - Announcement authenticity verification: SUSE security announcements are published via mailing lists and on Web sites. The authenticity and integrity of a SUSE security announcement is guaranteed by a cryptographic signature in each announcement. All SUSE security announcements are published with a valid signature. To verify the signature of the announcement, save it as text into a file and run the command gpg --verify <file> replacing <file> with the name of the file where you saved the announcement. The output for a valid signature looks like: gpg: Signature made <DATE> using RSA key ID 3D25D3D9 gpg: Good signature from "SuSE Security Team <security@suse.de>" where <DATE> is replaced by the date the document was signed. If the security team's key is not contained in your key ring, you can import it from the first installation CD. To import the key, use the command gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc - Package authenticity verification: SUSE update packages are available on many mirror FTP servers all over the world. While this service is considered valuable and important to the free and open source software community, the authenticity and the integrity of a package needs to be verified to ensure that it has not been tampered with. There are two verification methods that can be used independently from each other to prove the authenticity of a downloaded file or RPM package: 1) Using the internal gpg signatures of the rpm package 2) MD5 checksums as provided in this announcement 1) The internal rpm package signatures provide an easy way to verify the authenticity of an RPM package. Use the command rpm -v --checksig <file.rpm> to verify the signature of the package, replacing <file.rpm> with the filename of the RPM package downloaded. The package is unmodified if it contains a valid signature from build@suse.de with the key ID 9C800ACA. This key is automatically imported into the RPM database (on RPMv4-based distributions) and the gpg key ring of 'root' during installation. You can also find it on the first installation CD and at the end of this announcement. 2) If you need an alternative means of verification, use the md5sum command to verify the authenticity of the packages. Execute the command md5sum <filename.rpm> after you downloaded the file from a SUSE FTP server or its mirrors. Then compare the resulting md5sum with the one that is listed in the SUSE security announcement. Because the announcement containing the checksums is cryptographically signed (by security@suse.de), the checksums show proof of the authenticity of the package if the signature of the announcement is valid. Note that the md5 sums published in the SUSE Security Announcements are valid for the respective packages only. Newer versions of these packages cannot be verified. - SUSE runs two security mailing lists to which any interested party may subscribe: suse-security@suse.com - General Linux and SUSE security discussion. All SUSE security announcements are sent to this list. To subscribe, send an e-mail to <suse-security-subscribe@suse.com>. suse-security-announce@suse.com - SUSE's announce-only mailing list. Only SUSE's security announcements are sent to this list. To subscribe, send an e-mail to <suse-security-announce-subscribe@suse.com>. For general information or the frequently asked questions (FAQ), send mail to <suse-security-info@suse.com> or <suse-security-faq@suse.com>. ===================================================================== SUSE's security contact is <security@suse.com> or <security@suse.de>. The <security@suse.de> public key is listed below. ===================================================================== ______________________________________________________________________________ The information in this advisory may be distributed or reproduced, provided that the advisory is not modified in any way. In particular, the clear text signature should show proof of the authenticity of the text. SUSE Linux Products GmbH provides no warranties of any kind whatsoever with respect to the information contained in this security advisory. Type Bits/KeyID Date User ID pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de> pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de> - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.4.2 (GNU/Linux) mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh 1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+ cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7 tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63 Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+ x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0 Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2 saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+ 3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP +Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR 8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U 8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF 5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3 D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd 9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13 CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp 271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO =ypVs - -----END PGP PUBLIC KEY BLOCK----- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iQEVAwUBRH26R3ey5gA9JdPZAQLpSAf+IZa9QmbGUFeO8ihLM84sEUGCYARIeHG8 1XwzOY9t5f/+cGFNw5b1ANk52likCVj8TaX76N78lo12uY5+LP8QBfE3qzOiSawe +WXmDPvmDYYyO627GxD5oODWLlxJkWiNw+fty04G3AQx21jAT/2T929rpH1QLe/Q iK5nQarakjkH+1nuM3LO7EG39lFETLiWeSSBPdffRvhrmch4Q9QiBePTn0ItA1+o tuwQMiYChmMyeLZgRfcEMqKF+rndIJsZeL40uQJpr1myynjZ8ARVnPXKJTCbwX/W NglO8o8ohfjBgzKDbnCp//bjVIWydlZws4kIDxtXEDPOnqvZBVYwcg== =3MnB -----END PGP SIGNATURE-----
participants (1)
-
Marcus Meissner