U radu jezgre operacijskog sustava SLE11 SP1 (SUSE Linux Enterprise 11 Service Pack 1) uočeno je više sigurnosnih ranjivosti. Lokalni zloćudni korisnik navedene ranjivosti je mogao iskoristiti za napad uskraćivanjem usluga (DoS) i korupciju memorije.
Paket:
Linux kernel 2.6.x
Operacijski sustavi:
SUSE Linux Enterprise Server (SLES) 11
Kritičnost:
5
Problem:
korupcija memorije, pogreška u programskoj komponenti
SUSE Security Update: kernel update for SLE11 SP1
______________________________________________________________________________
Announcement ID: SUSE-SU-2011:1101-1
Rating: important
References: #588458 #603804 #632870 #642896 #649625 #667386
#669378 #688859 #694670 #699354 #699357 #701443
#701686 #704347 #706557 #707096 #707125 #707737
#708675 #708877 #709412 #711203 #711969 #712456
#712929 #713138 #713430 #714001 #714966 #715235
#715763 #716901 #719117
Cross-References: CVE-2011-2928 CVE-2011-3191 CVE-2011-3353
Affected Products:
SLE 11 SERVER Unsupported Extras
______________________________________________________________________________
An update that solves three vulnerabilities and has 30
fixes is now available.
Description:
The SUSE Linux Enterprise 11 Service Pack 1 kernel was
updated to 2.6.32.46 and fixes various bugs and security
issues.
Following security issues were fixed: CVE-2011-3191: A
signedness issue in CIFS could possibly have lead to to
memory corruption, if a malicious server could send crafted
replies to the host.
CVE-2011-3353: In the fuse filesystem,
FUSE_NOTIFY_INVAL_ENTRY did not check the length of the
write so the message processing could overrun and result in
a BUG_ON() in fuse_copy_fill(). This flaw could be used by
local users able to mount FUSE filesystems to crash the
system.
CVE-2011-2928: The befs_follow_link function in
fs/befs/linuxvfs.c in the Linux kernel did not validate the
length attribute of long symlinks, which allowed local
users to cause a denial of service (incorrect pointer
dereference and OOPS) by accessing a long symlink on a
malformed Be filesystem.
Also the following non security bugs were fixed:
- Added a missing reset for ioc_reset_in_progress in
SoftReset in the mtpsas driver (bnc#711969).
- Add support for the Digi/IBM PCIe 2-port Adapter
(bnc#708675).
- Always enable MSI-X on 5709 (bnc#707737).
- sched: fix broken SCHED_RESET_ON_FORK handling
(bnc#708877).
- sched: Fix rt_rq runtime leakage bug (bnc#707096).
- ACPI: allow passing down C1 information if no other
C-states exist.
- KDB: turn off kdb usb support by default (bnc#694670
bnc#603804).
- xfs: Added event tracing support.
- xfs: fix xfs_fsblock_t tracing.
- igb: extend maximum frame size to receive VLAN tagged
frames (bnc#688859).
- cfq: Do not allow queue merges for queues that have no
process references (bnc#712929).
- cfq: break apart merged cfqqs if they stop cooperating
(bnc#712929).
- cfq: calculate the seek_mean per cfq_queue not per
cfq_io_context (bnc#712929).
- cfq: change the meaning of the cfqq_coop flag
(bnc#712929).
- cfq-iosched: get rid of the coop_preempt flag
(bnc#712929).
- cfq: merge cooperating cfq_queues (bnc#712929).
- Fix FDDI and TR config checks in ipv4 arp and LLC
(bnc#715235).
- writeback: do uninterruptible sleep in
balance_dirty_pages() (bnc#699354 bnc#699357).
- xfs: fix memory reclaim recursion deadlock on locked
inode buffer (bnc#699355 bnc#699354).
- xfs: use GFP_NOFS for page cache allocation (bnc#699355
bnc#699354).
- virtio-net: init link state correctly (bnc#714966).
- cpufreq: pcc-cpufreq: sanity check to prevent a NULL
pointer dereference (bnc#709412).
- x86: ucode-amd: Do not warn when no ucode is available
for a CPU
- patches.arch/x86_64-unwind-annotations: Refresh
(bnc#588458).
- patches.suse/stack-unwind: Refresh (bnc#588458).
- splice: direct_splice_actor() should not use pos in sd
(bnc#715763).
- qdio: 2nd stage retry on SIGA-W busy conditions
(bnc#713138,LTC#74402).
- TTY: pty, fix pty counting (bnc#711203).
- Avoid deadlock in GFP_IO/GFP_FS allocation (bnc#632870).
- novfs: fix some DirCache locking issues (bnc#669378).
- novfs: fix some kmalloc/kfree issues (bnc#669378).
- novfs: fix off-by-one allocation error (bnc#669378).
- novfs: unlink directory after unmap (bnc#649625).
- novfs: last modification time not reliable (bnc#642896).
- x86 / IO APIC: Reset IRR in clear_IO_APIC_pin()
(bnc#701686, bnc#667386).
- mptfusion : Added check for SILI bit in READ_6 CDB for
DATA UNDERRUN ERRATA (bnc #712456).
- xfs: serialise unaligned direct IOs (bnc#707125).
- NFS: Ensure that we handle NFS4ERR_STALE_STATEID
correctly (bnc#701443).
- NFSv4: Do not call nfs4_state_mark_reclaim_reboot() from
error handlers (bnc#701443).
- NFSv4: Fix open recovery (bnc#701443).
- NFSv4.1: Do not call nfs4_schedule_state_recovery()
unnecessarily (bnc#701443).
Special Instructions and Notes:
Please reboot the system after installing this update.
Package List:
- SLE 11 SERVER Unsupported Extras (i586 ia64 ppc64 s390x x86_64):
kernel-default-extra-2.6.32.46-0.3.1
- SLE 11 SERVER Unsupported Extras (i586 x86_64):
kernel-xen-extra-2.6.32.46-0.3.1
- SLE 11 SERVER Unsupported Extras (ppc64):
kernel-ppc64-extra-2.6.32.46-0.3.1
- SLE 11 SERVER Unsupported Extras (i586):
kernel-pae-extra-2.6.32.46-0.3.1
References:
http://support.novell.com/security/cve/CVE-2011-2928.html
http://support.novell.com/security/cve/CVE-2011-3191.html
http://support.novell.com/security/cve/CVE-2011-3353.html
https://bugzilla.novell.com/588458
https://bugzilla.novell.com/603804
https://bugzilla.novell.com/632870
https://bugzilla.novell.com/642896
https://bugzilla.novell.com/649625
https://bugzilla.novell.com/667386
https://bugzilla.novell.com/669378
https://bugzilla.novell.com/688859
https://bugzilla.novell.com/694670
https://bugzilla.novell.com/699354
https://bugzilla.novell.com/699357
https://bugzilla.novell.com/701443
https://bugzilla.novell.com/701686
https://bugzilla.novell.com/704347
https://bugzilla.novell.com/706557
https://bugzilla.novell.com/707096
https://bugzilla.novell.com/707125
https://bugzilla.novell.com/707737
https://bugzilla.novell.com/708675
https://bugzilla.novell.com/708877
https://bugzilla.novell.com/709412
https://bugzilla.novell.com/711203
https://bugzilla.novell.com/711969
https://bugzilla.novell.com/712456
https://bugzilla.novell.com/712929
https://bugzilla.novell.com/713138
https://bugzilla.novell.com/713430
https://bugzilla.novell.com/714001
https://bugzilla.novell.com/714966
https://bugzilla.novell.com/715235
https://bugzilla.novell.com/715763
https://bugzilla.novell.com/716901
https://bugzilla.novell.com/719117
http://download.novell.com/patch/finder/?keywords=0077a9d97a9220061e5c5383b6a91b6a
http://download.novell.com/patch/finder/?keywords=17c299ec5c72561013e394661e8c1774
http://download.novell.com/patch/finder/?keywords=ae7e4cdc32d427f458768606f08979a1
http://download.novell.com/patch/finder/?keywords=e18fc5d18fa6afec4316bbd22c7968cc
http://download.novell.com/patch/finder/?keywords=fe7c633311f0a14664b71dab2a1bf490
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke