openSUSE-SU-2010:0634-1 (critical): kernel: security and bugfix update to 2.6.34.7
openSUSE Security Update: kernel: security and bugfix update to 2.6.34.7 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2010:0634-1 Rating: critical References: #600948 #628604 #632309 #633543 #633581 #635862 #636112 #637436 Affected Products: openSUSE 11.3 ______________________________________________________________________________ An update that contains security fixes can now be installed. It includes one version update. Description: The openSUSE 11.3 kernel was updated to versiuon 2.6.34.7. It fixes lots of bugs and security issues. A major regression in handling some USB Input devices (Mice and Keyboard) introduced by the previous update was fixed. Fixed lots of bugs in the ATH5K wireless driver. Following security issues were fixed: CVE-2010-3078: A XFS stack memory information disclosure was fixed. CVE-2010-2954: A NULL pointer dereference in the IRDA stack was fixed, which could lead to kernel crashes. CVE-2010-2959: A privilege escalation possibility in the CAN bus protocol module can_bcm was fixed. CVE-2010-2942: Several memory leaks in the net scheduling code were fixed. CVE-2010-2803: Fixed kernel memory information leaks from DRM ioctls. Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.3: zypper in -t patch kernel-3105 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.3 (i586 x86_64) [New Version: 2.6.34.7]: kernel-debug-2.6.34.7-0.2.2 kernel-debug-base-2.6.34.7-0.2.2 kernel-debug-devel-2.6.34.7-0.2.2 kernel-default-2.6.34.7-0.2.2 kernel-default-base-2.6.34.7-0.2.2 kernel-default-devel-2.6.34.7-0.2.2 kernel-desktop-2.6.34.7-0.2.2 kernel-desktop-base-2.6.34.7-0.2.2 kernel-desktop-devel-2.6.34.7-0.2.2 kernel-ec2-2.6.34.7-0.2.2 kernel-ec2-base-2.6.34.7-0.2.2 kernel-ec2-devel-2.6.34.7-0.2.2 kernel-ec2-extra-2.6.34.7-0.2.2 kernel-syms-2.6.34.7-0.2.2 kernel-trace-2.6.34.7-0.2.2 kernel-trace-base-2.6.34.7-0.2.2 kernel-trace-devel-2.6.34.7-0.2.2 kernel-vanilla-2.6.34.7-0.2.2 kernel-vanilla-base-2.6.34.7-0.2.2 kernel-vanilla-devel-2.6.34.7-0.2.2 kernel-xen-2.6.34.7-0.2.2 kernel-xen-base-2.6.34.7-0.2.2 kernel-xen-devel-2.6.34.7-0.2.2 preload-kmp-default-1.1_k2.6.34.7_0.2-19.1.2 preload-kmp-desktop-1.1_k2.6.34.7_0.2-19.1.2 - openSUSE 11.3 (noarch) [New Version: 2.6.34.7]: kernel-devel-2.6.34.7-0.2.2 kernel-source-2.6.34.7-0.2.2 kernel-source-vanilla-2.6.34.7-0.2.2 - openSUSE 11.3 (i586) [New Version: 2.6.34.7]: kernel-pae-2.6.34.7-0.2.2 kernel-pae-base-2.6.34.7-0.2.2 kernel-pae-devel-2.6.34.7-0.2.2 kernel-vmi-2.6.34.7-0.2.2 kernel-vmi-base-2.6.34.7-0.2.2 kernel-vmi-devel-2.6.34.7-0.2.2 References: https://bugzilla.novell.com/600948 https://bugzilla.novell.com/628604 https://bugzilla.novell.com/632309 https://bugzilla.novell.com/633543 https://bugzilla.novell.com/633581 https://bugzilla.novell.com/635862 https://bugzilla.novell.com/636112 https://bugzilla.novell.com/637436
participants (1)
-
opensuse-security@opensuse.org