SUSE-SU-2012:0364-1: important: Security update for Real Time Linux Kernel

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue Mar 13 17:08:31 MDT 2012


   SUSE Security Update: Security update for Real Time Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2012:0364-1
Rating:             important
References:         #590980 #591293 #651219 #653260 #698450 #699709 
                    #707096 #707288 #708877 #711203 #711539 #712366 
                    #714001 #716901 #722406 #726788 #732021 #734056 
                    #745881 
Cross-References:   CVE-2010-3873 CVE-2011-1576 CVE-2011-1577
                    CVE-2011-1833 CVE-2011-2203 CVE-2011-2918
                    CVE-2011-2928 CVE-2011-3191 CVE-2011-3353
                    CVE-2011-4081 CVE-2011-4110 CVE-2011-4326
                   
Affected Products:
                    SUSE Linux Enterprise Real Time 11 SP1
______________________________________________________________________________

   An update that solves 12 vulnerabilities and has 7 fixes is
   now available. It includes one version update.

Description:


   The SUSE Linux Enterprise Server 11 SP1 Realtime kernel was
   updated to  2.6.33.20 to fix various bugs and security
   issues.

   The following security issues have been fixed:

   * CVE-2011-4110: KEYS: Fix a NULL pointer deref in the
   user-defined key type, which allowed local attackers to
   Oops the kernel.
   * CVE-2011-4081: Avoid potential NULL pointer deref in
   ghash, which allowed local attackers to Oops the kernel.
   * CVE-2010-3873: When using X.25 communication a
   malicious sender could corrupt data structures, causing
   crashes or potential code execution. Please note that X.25
   needs to be setup to make this effective, which these days
   is usually not the case.
   * CVE-2011-2203: A NULL ptr dereference on mounting
   corrupt hfs filesystems was fixed which could be used by
   local attackers to crash the kernel.
   * CVE-2011-3191: A malicious CIFS server could cause a
   integer overflow on the local machine on directory index
   operations, in turn causing memory corruption.
   * CVE-2011-3353: In the fuse filesystem,
   FUSE_NOTIFY_INVAL_ENTRY did not check the length of the
   write so the message processing could overrun and result in
   a BUG_ON() in fuse_copy_fill(). This flaw could be used by
   local users able to mount FUSE filesystems to crash the
   system.
   * CVE-2011-4326: A bug was found in the way headroom
   check was performed in udp6_ufo_fragment() function. A
   remote attacker could use this flaw to crash the system.
   * CVE-2011-1576: The Generic Receive Offload (GRO)
   implementation in the Linux kernel allowed remote attackers
   to cause a denial of service via crafted VLAN packets that
   are processed by the napi_reuse_skb function, leading to
   (1) a memory leak or (2) memory corruption, a different
   vulnerability than CVE-2011-1478.
   * CVE-2011-1833: Added a kernel option to ensure
   ecryptfs is mounting only on paths belonging to the current
   ui, which would have allowed local attackers to potentially
   gain privileges via symlink attacks.
   * CVE-2011-2918: In the perf framework software event
   overflows could deadlock or delete an uninitialized timer.

   Included in Linux 2.6.32.19 stable update:

   * CVE-2011-2928: The befs_follow_link function in
   fs/befs/linuxvfs.c in the Linux kernel did not validate the
   length attribute of long symlinks, which allowed local
   users to cause a denial of service (incorrect pointer
   dereference and OOPS) by accessing a long symlink on a
   malformed Be filesystem.
   * CVE-2011-3353: In the fuse filesystem,
   FUSE_NOTIFY_INVAL_ENTRY did not check the length of the
   write so the message processing could overrun and result in
   a BUG_ON() in fuse_copy_fill(). This flaw could be used by
   local users able to mount FUSE filesystems to crash the
   system.
   * CVE-2011-1577: The Linux kernel automatically
   evaluated partition tables of storage devices. The code for
   evaluating EFI GUID partitions (in fs/partitions/efi.c)
   contained a bug that causes a kernel oops on certain
   corrupted GUID partition tables, which might be used by
   local attackers to crash the kernel or potentially execute
   code.

   The following non security bugs have been fixed:

   * Fix DL980G7 numa enumeration problem. HP bios SRAT
   table contains more entries (256) than SLERT NR_CPUS (128).
   Pull in mainline fixes to always parse the entire table,
   regardless of configured NR_CPUS.
   * x86, acpi: Parse all SRAT cpu entries even above the
   cpu number limitation (bnc#745881).
   * x86, ia64, acpi: Clean up x86-ism in
   drivers/acpi/numa.c (bnc#745881).
   * rt, timerfd: fix timerfd_settime() livelock.
   * Fix build failure on 12.1 systems.
   CONFIG_BUILD_DOCSRC builds Documentation/video4linux but
   without reference to local includes, thus build only
   succeeds on older SUSE releases where linux-glibc-devel
   provides (obsolete) videodev.h. Add upstream patch which
   drops support for v4lgrab.c which is safe as sample
   executable is not packaged in any released rpm.
   * Add missing references symset for the rt flavor
   (bnc#722406#c69).
   * Pick up SP1 82576 ET2 Quad Port driver addon. Pick up
   I350 as well, since it's just recognition of a follow-on
   part for 82580.
   * igb: Add support for 82576 ET2 Quad Port Server
   Adapter (bnc#591293, bnc#722406).
   * igb: add support for Intel I350 Gigabit Network
   Connection (bnc#590980).
   * Fix regression introduced by backport of mainline
   commit 43fa5460
   * sched/rt: Migrate equal priority tasks to available
   CPUs.
   * sched: fix broken SCHED_RESET_ON_FORK handling
   (bnc#708877).
   * sched: Fix rt_rq runtime leakage bug (bnc#707096).

   Security Issue references:

   * CVE-2011-4110
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4110
   >
   * CVE-2011-4081
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4081
   >
   * CVE-2010-3873
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873
   >
   * CVE-2011-2203
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2203
   >
   * CVE-2011-3191
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3191
   >
   * CVE-2011-3353
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3353
   >
   * CVE-2011-4326
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4326
   >
   * CVE-2011-1576
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1576
   >
   * CVE-2011-1833
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1833
   >
   * CVE-2011-2918
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2918
   >
   * CVE-2011-2928
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2928
   >
   * CVE-2011-3353
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3353
   >
   * CVE-2011-1577
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577
   >

Indications:

   Everyone using the Real Time Linux Kernel on x86_64 architecture should update.

Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Real Time 11 SP1:

      zypper in -t patch slertesp1-kernel-5802

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Real Time 11 SP1 (x86_64) [New Version: 2.6.33.20]:

      brocade-bna-kmp-rt-2.1.0.0_2.6.33.20_rt31_0.3-0.2.34
      cluster-network-kmp-rt-1.4_2.6.33.20_rt31_0.3-2.5.28
      cluster-network-kmp-rt_trace-1.4_2.6.33.20_rt31_0.3-2.5.28
      drbd-kmp-rt-8.3.11_2.6.33.20_rt31_0.3-0.3.28
      drbd-kmp-rt_trace-8.3.11_2.6.33.20_rt31_0.3-0.3.28
      iscsitarget-kmp-rt-1.4.19_2.6.33.20_rt31_0.3-0.9.11.2
      kernel-rt-2.6.33.20-0.3.1
      kernel-rt-base-2.6.33.20-0.3.1
      kernel-rt-devel-2.6.33.20-0.3.1
      kernel-rt_trace-2.6.33.20-0.3.1
      kernel-rt_trace-base-2.6.33.20-0.3.1
      kernel-rt_trace-devel-2.6.33.20-0.3.1
      kernel-source-rt-2.6.33.20-0.3.1
      kernel-syms-rt-2.6.33.20-0.3.1
      ocfs2-kmp-rt-1.6_2.6.33.20_rt31_0.3-0.4.2.28
      ocfs2-kmp-rt_trace-1.6_2.6.33.20_rt31_0.3-0.4.2.28
      ofed-kmp-rt-1.5.2_2.6.33.20_rt31_0.3-0.9.13.15


References:

   http://support.novell.com/security/cve/CVE-2010-3873.html
   http://support.novell.com/security/cve/CVE-2011-1576.html
   http://support.novell.com/security/cve/CVE-2011-1577.html
   http://support.novell.com/security/cve/CVE-2011-1833.html
   http://support.novell.com/security/cve/CVE-2011-2203.html
   http://support.novell.com/security/cve/CVE-2011-2918.html
   http://support.novell.com/security/cve/CVE-2011-2928.html
   http://support.novell.com/security/cve/CVE-2011-3191.html
   http://support.novell.com/security/cve/CVE-2011-3353.html
   http://support.novell.com/security/cve/CVE-2011-4081.html
   http://support.novell.com/security/cve/CVE-2011-4110.html
   http://support.novell.com/security/cve/CVE-2011-4326.html
   https://bugzilla.novell.com/590980
   https://bugzilla.novell.com/591293
   https://bugzilla.novell.com/651219
   https://bugzilla.novell.com/653260
   https://bugzilla.novell.com/698450
   https://bugzilla.novell.com/699709
   https://bugzilla.novell.com/707096
   https://bugzilla.novell.com/707288
   https://bugzilla.novell.com/708877
   https://bugzilla.novell.com/711203
   https://bugzilla.novell.com/711539
   https://bugzilla.novell.com/712366
   https://bugzilla.novell.com/714001
   https://bugzilla.novell.com/716901
   https://bugzilla.novell.com/722406
   https://bugzilla.novell.com/726788
   https://bugzilla.novell.com/732021
   https://bugzilla.novell.com/734056
   https://bugzilla.novell.com/745881
   http://download.novell.com/patch/finder/?keywords=2e813f9c7b45c2dd561fb51cf3245000



More information about the sle-security-updates mailing list