openSUSE Security Update: Linux Kernel: Security/Bugfix update to fix local privilege escalations ______________________________________________________________________________ Announcement ID: openSUSE-SU-2010:0895-2 Rating: critical References: #472432 #524981 #536699 #576344 #577967 #598293 #601283 #603411 #607123 #608994 #609506 #610362 #613273 #615143 #616080 #619470 #620443 #624850 #627386 #627447 #628604 #631801 #632309 #632568 #633543 #633585 #633593 #634991 #635413 #635425 #636112 #636461 #636850 #637436 #638277 #638324 #639481 #639482 #639709 #640660 #640721 Affected Products: openSUSE 11.1 ______________________________________________________________________________ An update that contains security fixes can now be installed. It includes one version update. Description: This security update of the SUSE Linux Enterprise 11 GA kernel updates the kernel to 2.6.27.54 and fixes various security issues and other bugs. Following security issues were fixed: CVE-2010-3310: Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel allowed local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions. CVE-2010-2955: A kernel information leak via the WEXT ioctl was fixed. CVE-2010-3080: A double free in an alsa error path was fixed, which could lead to kernel crashes. CVE-2010-3078: Fixed a kernel information leak in the xfs filesystem. CVE-2010-3296: Fixed a kernel information leak in the cxgb3 driver. CVE-2010-3297: Fixed a kernel information leak in the net/eql driver. CVE-2010-2954: The irda_bind function in net/irda/af_irda.c in the Linux kernel did not properly handle failure of the irda_open_tsap function, which allowed local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket. CVE-2010-2946: The 'os2' xattr namespace on the jfs filesystem could be used to bypass xattr namespace rules. CVE-2010-2942: Fixed a kernel information leak in the net scheduler code. CVE-2010-3015: Integer overflow in the ext4_ext_get_blocks function in fs/ext4/extents.c in the Linux kernel allowed local users to cause a denial of service (BUG and system crash) via a write operation on the last block of a large file, followed by a sync operation. CVE-2010-2803: The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel allowed local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount. CVE-2010-2798: The gfs2_dirent_find_space function in fs/gfs2/dir.c in the Linux kernel used an incorrect size value in calculations associated with sentinel directory entries, which allowed local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact by renaming a file in a GFS2 filesystem, related to the gfs2_rename function in fs/gfs2/ops_inode.c. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.1: zypper in -t patch kernel-3357 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.1 (i586 ppc x86_64) [New Version: 2.6.27.54]: kernel-default-2.6.27.54-0.1.1 kernel-default-base-2.6.27.54-0.1.1 kernel-default-extra-2.6.27.54-0.1.1 kernel-source-2.6.27.54-0.1.1 kernel-syms-2.6.27.54-0.1.1 kernel-vanilla-2.6.27.54-0.1.1 - openSUSE 11.1 (i586 x86_64) [New Version: 2.6.27.54]: kernel-debug-2.6.27.54-0.1.1 kernel-debug-base-2.6.27.54-0.1.1 kernel-debug-extra-2.6.27.54-0.1.1 kernel-trace-2.6.27.54-0.1.1 kernel-trace-base-2.6.27.54-0.1.1 kernel-trace-extra-2.6.27.54-0.1.1 kernel-xen-2.6.27.54-0.1.1 kernel-xen-base-2.6.27.54-0.1.1 kernel-xen-extra-2.6.27.54-0.1.1 - openSUSE 11.1 (noarch): kernel-docs-2.6.3-3.13.122 - openSUSE 11.1 (i586) [New Version: 2.6.27.54]: kernel-pae-2.6.27.54-0.1.1 kernel-pae-base-2.6.27.54-0.1.1 kernel-pae-extra-2.6.27.54-0.1.1 - openSUSE 11.1 (ppc) [New Version: 2.6.27.54]: kernel-kdump-2.6.27.54-0.1.1 kernel-ppc64-2.6.27.54-0.1.1 kernel-ppc64-base-2.6.27.54-0.1.1 kernel-ppc64-extra-2.6.27.54-0.1.1 kernel-ps3-2.6.27.54-0.1.1 References: https://bugzilla.novell.com/472432 https://bugzilla.novell.com/524981 https://bugzilla.novell.com/536699 https://bugzilla.novell.com/576344 https://bugzilla.novell.com/577967 https://bugzilla.novell.com/598293 https://bugzilla.novell.com/601283 https://bugzilla.novell.com/603411 https://bugzilla.novell.com/607123 https://bugzilla.novell.com/608994 https://bugzilla.novell.com/609506 https://bugzilla.novell.com/610362 https://bugzilla.novell.com/613273 https://bugzilla.novell.com/615143 https://bugzilla.novell.com/616080 https://bugzilla.novell.com/619470 https://bugzilla.novell.com/620443 https://bugzilla.novell.com/624850 https://bugzilla.novell.com/627386 https://bugzilla.novell.com/627447 https://bugzilla.novell.com/628604 https://bugzilla.novell.com/631801 https://bugzilla.novell.com/632309 https://bugzilla.novell.com/632568 https://bugzilla.novell.com/633543 https://bugzilla.novell.com/633585 https://bugzilla.novell.com/633593 https://bugzilla.novell.com/634991 https://bugzilla.novell.com/635413 https://bugzilla.novell.com/635425 https://bugzilla.novell.com/636112 https://bugzilla.novell.com/636461 https://bugzilla.novell.com/636850 https://bugzilla.novell.com/637436 https://bugzilla.novell.com/638277 https://bugzilla.novell.com/638324 https://bugzilla.novell.com/639481 https://bugzilla.novell.com/639482 https://bugzilla.novell.com/639709 https://bugzilla.novell.com/640660 https://bugzilla.novell.com/640721