User: Password:
Subscribe / Log in / New account

openSUSE alert openSUSE-SU-2011:1221-1 (kernel)

Subject:  openSUSE-SU-2011:1221-1: moderate: kernel: security and bugfix update.
Date:  Tue, 8 Nov 2011 15:08:24 +0100 (CET)
Message-ID:  <>
Archive-link:  Article, Thread

openSUSE Security Update: kernel: security and bugfix update. ______________________________________________________________________________ Announcement ID: openSUSE-SU-2011:1221-1 Rating: moderate References: #685276 #692784 #696107 #701355 #706374 #710352 #711203 #711539 #712023 #712366 #714001 #716901 #718028 #719117 Cross-References: CVE-2011-1776 CVE-2011-1833 CVE-2011-2918 CVE-2011-3191 CVE-2011-3353 CVE-2011-3363 Affected Products: openSUSE 11.3 ______________________________________________________________________________ An update that solves 6 vulnerabilities and has 8 fixes is now available. It includes one version update. Description: The openSUSE 11.3 kernel was updated to fix various bugs and security issues. Following security issues have been fixed: CVE-2011-1833: Added a kernel option to ensure ecryptfs is mounting only on paths belonging to the current ui, which would have allowed local attackers to potentially gain privileges via symlink attacks. CVE-2011-3363: Always check the path in CIFS mounts to avoid interesting filesystem path interaction issues and potential crashes. CVE-2011-2918: In the perf framework software event overflows could deadlock or delete an uninitialized timer. CVE-2011-3353: In the fuse filesystem, FUSE_NOTIFY_INVAL_ENTRY did not check the length of the write so the message processing could overrun and result in a BUG_ON() in fuse_copy_fill(). This flaw could be used by local users able to mount FUSE filesystems to crash the system. CVE-2011-3191: A signedness issue in CIFS could possibly have lead to to memory corruption, if a malicious server could send crafted replies to the host. CVE-2011-1776: The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel did not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allowed physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577. Following non security bugs were fixed: - drm/radeon/kms: Fix I2C mask definitions (bnc#712023). - ext4: Fix max file size and logical block counting of extent format file (bnc#706374). - TTY: pty, fix pty counting (bnc#711203). - Update Xen patches to - xen/blkfront: fix data size for xenbus_gather in connect(). - xen/xenbus: fix xenbus_transaction_start() hang caused by double xenbus_transaction_end(). - xen/blkback: don't fail empty barrier requests. - xen/blktap: fix locking (bnc#685276). - xen/xenbus: don't BUG() on user mode induced conditions (bnc#696107). - xen/blkfront: avoid NULL de-reference in CDROM ioctl handling (bnc#701355). - intr-remap: allow disabling source id checking (bnc#710352). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.3: zypper in -t patch kernel-5360 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.3 (i586 x86_64) [New Version:]: kernel-debug- kernel-debug-base- kernel-debug-devel- kernel-default- kernel-default-base- kernel-default-devel- kernel-desktop- kernel-desktop-base- kernel-desktop-devel- kernel-ec2- kernel-ec2-base- kernel-ec2-devel- kernel-ec2-extra- kernel-syms- kernel-trace- kernel-trace-base- kernel-trace-devel- kernel-vanilla- kernel-vanilla-base- kernel-vanilla-devel- kernel-xen- kernel-xen-base- kernel-xen-devel- preload-kmp-default-1.1_k2.6.34.10_0.4-19.1.30 preload-kmp-desktop-1.1_k2.6.34.10_0.4-19.1.30 - openSUSE 11.3 (noarch) [New Version:]: kernel-devel- kernel-source- kernel-source-vanilla- - openSUSE 11.3 (i586) [New Version:]: kernel-pae- kernel-pae-base- kernel-pae-devel- kernel-vmi- kernel-vmi-base- kernel-vmi-devel- References:

(Log in to post comments)

Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds