User: Password:
Subscribe / Log in / New account

openSUSE alert openSUSE-SU-2011:1222-1 (kernel)

Subject:  openSUSE-SU-2011:1222-1: moderate: kernel: security and bugfix update.
Date:  Tue, 8 Nov 2011 16:08:22 +0100 (CET)
Message-ID:  <>
Archive-link:  Article, Thread

openSUSE Security Update: kernel: security and bugfix update. ______________________________________________________________________________ Announcement ID: openSUSE-SU-2011:1222-1 Rating: moderate References: #626119 #638985 #642896 #649625 #669378 #672008 #678097 #682204 #686412 #692784 #697901 #706374 #711203 #711539 #712023 #712366 #713229 #714001 #716901 #718028 #719450 #719710 Cross-References: CVE-2011-1776 CVE-2011-1833 CVE-2011-2183 CVE-2011-2695 CVE-2011-2918 CVE-2011-3191 CVE-2011-3353 CVE-2011-3363 Affected Products: openSUSE 11.4 ______________________________________________________________________________ An update that solves 8 vulnerabilities and has 14 fixes is now available. It includes one version update. Description: The openSUSE 11.4 kernel was updated to fixing lots of bugs and security issues. Following security issues have been fixed: CVE-2011-1833: Added a kernel option to ensure ecryptfs is mounting only on paths belonging to the current ui, which would have allowed local attackers to potentially gain privileges via symlink attacks. CVE-2011-2695: Multiple off-by-one errors in the ext4 subsystem in the Linux kernel allowed local users to cause a denial of service (BUG_ON and system crash) by accessing a sparse file in extent format with a write operation involving a block number corresponding to the largest possible 32-bit unsigned integer. CVE-2011-3363: Always check the path in CIFS mounts to avoid interesting filesystem path interaction issues and potential crashes. CVE-2011-2918: In the perf framework software event overflows could deadlock or delete an uninitialized timer. CVE-2011-3353: In the fuse filesystem, FUSE_NOTIFY_INVAL_ENTRY did not check the length of the write so the message processing could overrun and result in a BUG_ON() in fuse_copy_fill(). This flaw could be used by local users able to mount FUSE filesystems to crash the system. CVE-2011-2183: Fixed a race between ksmd and other memory management code, which could result in a NULL ptr dereference and kernel crash. CVE-2011-3191: A signedness issue in CIFS could possibly have lead to to memory corruption, if a malicious server could send crafted replies to the host. CVE-2011-1776: The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel did not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allowed physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577. Following non-security bugs were fixed: - novfs: Unable to change password in the Novell Client for Linux (bnc#713229). - novfs: last modification time not reliable (bnc#642896). - novfs: unlink directory after unmap (bnc#649625). - fs: novfs: Fix exit handlers on local_unlink (bnc#649625). - novfs: "Unable to save Login Script" appears when trying to save a user login script (bnc#638985). - fs: novfs: Limit check for datacopy between user and kernel space. - novfs: Fix checking of login id (bnc#626119). - novfs: Set the sticky bit for the novfs mountpoint (bnc#686412). - ACPICA: Fix issues/fault with automatic "serialized" method support (bnc#678097). - drm/radeon/kms: Fix I2C mask definitions (bnc#712023). - ext4: Fix max file size and logical block counting of extent format file (bnc#706374). - novfs: fix off-by-one allocation error (bnc#669378 bnc#719710). - novfs: fix some kmalloc/kfree issues (bnc#669378 bnc#719710). - novfs: fix some DirCache locking issues (bnc#669378 bnc#719710). - memsw: remove noswapaccount kernel parameter (bnc#719450). - Provide memory controller swap extension. Keep the feature disabled by default. Use swapaccount=1 kernel boot parameter for enabling it. - Config cleanups: CONFIG_OLPC should be enabled only for i386 non PAE - TTY: pty, fix pty counting (bnc#711203). - USB: OHCI: fix another regression for NVIDIA controllers (bnc#682204). - xen/blkfront: avoid NULL de-reference in CDROM ioctl handling. - x86, mtrr: lock stop machine during MTRR rendezvous sequence (bnc#672008). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch kernel-5359 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.4 (i586 x86_64) [New Version:]: kernel-debug- kernel-debug-base- kernel-debug-devel- kernel-default- kernel-default-base- kernel-default-devel- kernel-desktop- kernel-desktop-base- kernel-desktop-devel- kernel-ec2- kernel-ec2-base- kernel-ec2-devel- kernel-ec2-extra- kernel-syms- kernel-trace- kernel-trace-base- kernel-trace-devel- kernel-vanilla- kernel-vanilla-base- kernel-vanilla-devel- kernel-xen- kernel-xen-base- kernel-xen-devel- preload-kmp-default-1.2_k2.6.37.6_0.9-6.7.20 preload-kmp-desktop-1.2_k2.6.37.6_0.9-6.7.20 - openSUSE 11.4 (noarch) [New Version:]: kernel-devel- kernel-docs- kernel-source- kernel-source-vanilla- - openSUSE 11.4 (i586) [New Version:]: kernel-pae- kernel-pae-base- kernel-pae-devel- kernel-vmi- kernel-vmi-base- kernel-vmi-devel- References:

(Log in to post comments)

Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds