Mailinglist Archive: opensuse-updates (48 mails)

< Previous Next >
openSUSE-SU-2010:0734-1 (important): kernel: security and bugfix update.
  • From: opensuse-security@xxxxxxxxxxxx
  • Date: Fri, 15 Oct 2010 23:08:17 +0200 (CEST)
  • Message-id: <20101015210818.61BC9BE45@xxxxxxxxxxxxxx>
openSUSE Security Update: kernel: security and bugfix update.
______________________________________________________________________________

Announcement ID: openSUSE-SU-2010:0734-1
Rating: important
References: #613835 #614670 #638709 #640338 #640568 #640721
#641479 #642009 #644046
Cross-References: CVE-2010-2962 CVE-2010-3310
Affected Products:
openSUSE 11.3
______________________________________________________________________________

An update that solves two vulnerabilities and has 7 fixes
is now available. It includes one version update.

Description:

This updated openSUSE 11.3 kernel fixes the following
security bugs:

CVE-2010-3310: local users could corrupt kernel heap memory
via ROSE sockets.

CVE-2010-2962: local users could write to any kernel memory
location via the i915 GEM ioctl interface.

Additionally the update restores the
compat_alloc_userspace() inline function and includes
several other bug fixes.


Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.3:

zypper in -t patch kernel-3315

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.3 (i586 x86_64) [New Version: 2.6.34.7]:

kernel-debug-2.6.34.7-0.4.1
kernel-debug-base-2.6.34.7-0.4.1
kernel-debug-devel-2.6.34.7-0.4.1
kernel-default-2.6.34.7-0.4.1
kernel-default-base-2.6.34.7-0.4.1
kernel-default-devel-2.6.34.7-0.4.1
kernel-desktop-2.6.34.7-0.4.1
kernel-desktop-base-2.6.34.7-0.4.1
kernel-desktop-devel-2.6.34.7-0.4.1
kernel-ec2-2.6.34.7-0.4.1
kernel-ec2-base-2.6.34.7-0.4.1
kernel-ec2-devel-2.6.34.7-0.4.1
kernel-ec2-extra-2.6.34.7-0.4.1
kernel-syms-2.6.34.7-0.4.1
kernel-trace-2.6.34.7-0.4.1
kernel-trace-base-2.6.34.7-0.4.1
kernel-trace-devel-2.6.34.7-0.4.1
kernel-vanilla-2.6.34.7-0.4.1
kernel-vanilla-base-2.6.34.7-0.4.1
kernel-vanilla-devel-2.6.34.7-0.4.1
kernel-xen-2.6.34.7-0.4.1
kernel-xen-base-2.6.34.7-0.4.1
kernel-xen-devel-2.6.34.7-0.4.1
preload-kmp-default-1.1_k2.6.34.7_0.4-19.1.7
preload-kmp-desktop-1.1_k2.6.34.7_0.4-19.1.7

- openSUSE 11.3 (noarch) [New Version: 2.6.34.7]:

kernel-devel-2.6.34.7-0.4.1
kernel-source-2.6.34.7-0.4.1
kernel-source-vanilla-2.6.34.7-0.4.1

- openSUSE 11.3 (i586) [New Version: 2.6.34.7]:

kernel-pae-2.6.34.7-0.4.1
kernel-pae-base-2.6.34.7-0.4.1
kernel-pae-devel-2.6.34.7-0.4.1
kernel-vmi-2.6.34.7-0.4.1
kernel-vmi-base-2.6.34.7-0.4.1
kernel-vmi-devel-2.6.34.7-0.4.1


References:

http://support.novell.com/security/cve/CVE-2010-2962.html
http://support.novell.com/security/cve/CVE-2010-3310.html
https://bugzilla.novell.com/613835
https://bugzilla.novell.com/614670
https://bugzilla.novell.com/638709
https://bugzilla.novell.com/640338
https://bugzilla.novell.com/640568
https://bugzilla.novell.com/640721
https://bugzilla.novell.com/641479
https://bugzilla.novell.com/642009
https://bugzilla.novell.com/644046


< Previous Next >
This Thread
  • No further messages