Mailinglist Archive: opensuse-updates (41 mails)

< Previous Next >
openSUSE-SU-2010:0895-2 (critical): Linux Kernel: Security/Bugfix update to fix local privilege escalations
  • From: opensuse-security@xxxxxxxxxxxx
  • Date: Wed, 3 Nov 2010 04:08:14 +0100 (CET)
  • Message-id: <20101103030815.E0867BE51@xxxxxxxxxxxxxx>
openSUSE Security Update: Linux Kernel: Security/Bugfix update to fix local
privilege escalations
______________________________________________________________________________

Announcement ID: openSUSE-SU-2010:0895-2
Rating: critical
References: #472432 #524981 #536699 #576344 #577967 #598293
#601283 #603411 #607123 #608994 #609506 #610362
#613273 #615143 #616080 #619470 #620443 #624850
#627386 #627447 #628604 #631801 #632309 #632568
#633543 #633585 #633593 #634991 #635413 #635425
#636112 #636461 #636850 #637436 #638277 #638324
#639481 #639482 #639709 #640660 #640721
Affected Products:
openSUSE 11.1
______________________________________________________________________________

An update that contains security fixes can now be
installed. It includes one version update.

Description:

This security update of the SUSE Linux Enterprise 11 GA
kernel updates the kernel to 2.6.27.54 and fixes various
security issues and other bugs.

Following security issues were fixed: CVE-2010-3310:
Multiple integer signedness errors in net/rose/af_rose.c in
the Linux kernel allowed local users to cause a denial of
service (heap memory corruption) or possibly have
unspecified other impact via a rose_getname function call,
related to the rose_bind and rose_connect functions.

CVE-2010-2955: A kernel information leak via the WEXT ioctl
was fixed.

CVE-2010-3080: A double free in an alsa error path was
fixed, which could lead to kernel crashes.

CVE-2010-3078: Fixed a kernel information leak in the xfs
filesystem.

CVE-2010-3296: Fixed a kernel information leak in the cxgb3
driver.

CVE-2010-3297: Fixed a kernel information leak in the
net/eql driver.

CVE-2010-2954: The irda_bind function in net/irda/af_irda.c
in the Linux kernel did not properly handle failure of the
irda_open_tsap function, which allowed local users to cause
a denial of service (NULL pointer dereference and panic)
and possibly have unspecified other impact via multiple
unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA)
socket.

CVE-2010-2946: The 'os2' xattr namespace on the jfs
filesystem could be used to bypass xattr namespace rules.

CVE-2010-2942: Fixed a kernel information leak in the net
scheduler code.

CVE-2010-3015: Integer overflow in the ext4_ext_get_blocks
function in fs/ext4/extents.c in the Linux kernel allowed
local users to cause a denial of service (BUG and system
crash) via a write operation on the last block of a large
file, followed by a sync operation.

CVE-2010-2803: The drm_ioctl function in
drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager
(DRM) subsystem in the Linux kernel allowed local users to
obtain potentially sensitive information from kernel memory
by requesting a large memory-allocation amount.

CVE-2010-2798: The gfs2_dirent_find_space function in
fs/gfs2/dir.c in the Linux kernel used an incorrect size
value in calculations associated with sentinel directory
entries, which allowed local users to cause a denial of
service (NULL pointer dereference and panic) and possibly
have unspecified other impact by renaming a file in a GFS2
filesystem, related to the gfs2_rename function in
fs/gfs2/ops_inode.c.


Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.1:

zypper in -t patch kernel-3357

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.1 (i586 ppc x86_64) [New Version: 2.6.27.54]:

kernel-default-2.6.27.54-0.1.1
kernel-default-base-2.6.27.54-0.1.1
kernel-default-extra-2.6.27.54-0.1.1
kernel-source-2.6.27.54-0.1.1
kernel-syms-2.6.27.54-0.1.1
kernel-vanilla-2.6.27.54-0.1.1

- openSUSE 11.1 (i586 x86_64) [New Version: 2.6.27.54]:

kernel-debug-2.6.27.54-0.1.1
kernel-debug-base-2.6.27.54-0.1.1
kernel-debug-extra-2.6.27.54-0.1.1
kernel-trace-2.6.27.54-0.1.1
kernel-trace-base-2.6.27.54-0.1.1
kernel-trace-extra-2.6.27.54-0.1.1
kernel-xen-2.6.27.54-0.1.1
kernel-xen-base-2.6.27.54-0.1.1
kernel-xen-extra-2.6.27.54-0.1.1

- openSUSE 11.1 (noarch):

kernel-docs-2.6.3-3.13.122

- openSUSE 11.1 (i586) [New Version: 2.6.27.54]:

kernel-pae-2.6.27.54-0.1.1
kernel-pae-base-2.6.27.54-0.1.1
kernel-pae-extra-2.6.27.54-0.1.1

- openSUSE 11.1 (ppc) [New Version: 2.6.27.54]:

kernel-kdump-2.6.27.54-0.1.1
kernel-ppc64-2.6.27.54-0.1.1
kernel-ppc64-base-2.6.27.54-0.1.1
kernel-ppc64-extra-2.6.27.54-0.1.1
kernel-ps3-2.6.27.54-0.1.1


References:

https://bugzilla.novell.com/472432
https://bugzilla.novell.com/524981
https://bugzilla.novell.com/536699
https://bugzilla.novell.com/576344
https://bugzilla.novell.com/577967
https://bugzilla.novell.com/598293
https://bugzilla.novell.com/601283
https://bugzilla.novell.com/603411
https://bugzilla.novell.com/607123
https://bugzilla.novell.com/608994
https://bugzilla.novell.com/609506
https://bugzilla.novell.com/610362
https://bugzilla.novell.com/613273
https://bugzilla.novell.com/615143
https://bugzilla.novell.com/616080
https://bugzilla.novell.com/619470
https://bugzilla.novell.com/620443
https://bugzilla.novell.com/624850
https://bugzilla.novell.com/627386
https://bugzilla.novell.com/627447
https://bugzilla.novell.com/628604
https://bugzilla.novell.com/631801
https://bugzilla.novell.com/632309
https://bugzilla.novell.com/632568
https://bugzilla.novell.com/633543
https://bugzilla.novell.com/633585
https://bugzilla.novell.com/633593
https://bugzilla.novell.com/634991
https://bugzilla.novell.com/635413
https://bugzilla.novell.com/635425
https://bugzilla.novell.com/636112
https://bugzilla.novell.com/636461
https://bugzilla.novell.com/636850
https://bugzilla.novell.com/637436
https://bugzilla.novell.com/638277
https://bugzilla.novell.com/638324
https://bugzilla.novell.com/639481
https://bugzilla.novell.com/639482
https://bugzilla.novell.com/639709
https://bugzilla.novell.com/640660
https://bugzilla.novell.com/640721


< Previous Next >
This Thread
  • No further messages