SUSE-SU-2011:0635-2: moderate: Security update for Linux kernel

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Sun Feb 26 20:08:13 MST 2012


   SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2011:0635-2
Rating:             moderate
References:         #211997 #363921 #506571 #518089 #570121 #584522 
                    #597771 #59807 #598159 #599213 #599826 #608994 
                    #612213 #615929 #620372 #641575 #644880 #646633 
                    #647632 #650513 #651109 #652939 #652940 #655670 
                    #657350 #657759 #660233 #664725 #678356 #686813 
                    
Affected Products:
                    SUSE Linux Enterprise Server 10 SP2
______________________________________________________________________________

   An update that contains security fixes can now be installed.

Description:


   This update fixes a several security issues and various
   bugs in the SUSE  Linux Enterprise 10 SP 2 Long Term
   Service Pack Support (LTSS) kernel.

   The following security issues were fixed:

   *

   CVE-2011-1573: Boundschecking was missing in
   AARESOLVE_OFFSET, which allowed local attackers to
   overwrite kernel memory and so escalate privileges or crash
   the kernel.

   *

   CVE-2010-3849: The econet_sendmsg function in
   net/econet/af_econet.c in the Linux kernel, when an econet
   address is configured, allowed local users to cause a
   denial of service (NULL pointer dereference and OOPS) via a
   sendmsg call that specifies a NULL value for the remote
   address field.

   *

   CVE-2010-3848: Stack-based buffer overflow in the
   econet_sendmsg function in net/econet/af_econet.c in the
   Linux kernel when an econet address is configured, allowed
   local users to gain privileges by providing a large number
   of iovec structures.

   *

   CVE-2010-3850: The ec_dev_ioctl function in
   net/econet/af_econet.c in the Linux kernel did not require
   the CAP_NET_ADMIN capability, which allowed local users to
   bypass intended access restrictions and configure econet
   addresses via an SIOCSIFADDR ioctl call.

   *

   CVE-2010-4258: A local attacker could use a Oops
   (kernel crash) caused by other flaws to write a 0 byte to a
   attacker controlled address in the kernel. This could lead
   to privilege escalation together with other issues.

   *

   CVE-2010-4160: Multiple integer overflows in the (1)
   pppol2tp_sendmsg function in net/l2tp/l2tp_ppp.c, and the
   (2) l2tp_ip_sendmsg function in net/l2tp/l2tp_ip.c, in the
   PPPoL2TP and IPoL2TP implementations in the Linux kernel
   allowed local users to cause a denial of service (heap
   memory corruption and panic) or possibly gain privileges
   via a crafted sendto call.

   *

   CVE-2010-4157: A 32bit vs 64bit integer mismatch in
   gdth_ioctl_alloc could lead to memory corruption in the
   GDTH driver.

   *

   CVE-2010-3081: Incorrect buffer handling in the
   biarch-compat buffer handling could be used by local
   attackers to gain root privileges. This problem affects
   foremost x86_64, or potentially other biarch platforms,
   like PowerPC and S390x.

   *

   CVE-2010-2521: Multiple buffer overflows in
   fs/nfsd/nfs4xdr.c in the XDR implementation in the NFS
   server in the Linux kernel allowed remote attackers to
   cause a denial of service (panic) or possibly execute
   arbitrary code via a crafted NFSv4 compound WRITE request,
   related to the read_buf and nfsd4_decode_compound functions.

Indications:

   Everyone using the Linux Kernel on s390x architecture should update.

Special Instructions and Notes:

   Please reboot the system after installing this update.


Package List:

   - SUSE Linux Enterprise Server 10 SP2 (s390x):

      kernel-default-2.6.16.60-0.42.11
      kernel-source-2.6.16.60-0.42.11
      kernel-syms-2.6.16.60-0.42.11


References:

   https://bugzilla.novell.com/211997
   https://bugzilla.novell.com/363921
   https://bugzilla.novell.com/506571
   https://bugzilla.novell.com/518089
   https://bugzilla.novell.com/570121
   https://bugzilla.novell.com/584522
   https://bugzilla.novell.com/597771
   https://bugzilla.novell.com/59807
   https://bugzilla.novell.com/598159
   https://bugzilla.novell.com/599213
   https://bugzilla.novell.com/599826
   https://bugzilla.novell.com/608994
   https://bugzilla.novell.com/612213
   https://bugzilla.novell.com/615929
   https://bugzilla.novell.com/620372
   https://bugzilla.novell.com/641575
   https://bugzilla.novell.com/644880
   https://bugzilla.novell.com/646633
   https://bugzilla.novell.com/647632
   https://bugzilla.novell.com/650513
   https://bugzilla.novell.com/651109
   https://bugzilla.novell.com/652939
   https://bugzilla.novell.com/652940
   https://bugzilla.novell.com/655670
   https://bugzilla.novell.com/657350
   https://bugzilla.novell.com/657759
   https://bugzilla.novell.com/660233
   https://bugzilla.novell.com/664725
   https://bugzilla.novell.com/678356
   https://bugzilla.novell.com/686813
   http://download.novell.com/patch/finder/?keywords=026b38ec9a6f1f9490f7afc997212483



More information about the sle-security-updates mailing list