Linux Kernel Securyty and Bugfix Update to 2.6.37.6

Antworten
Benutzeravatar
Lighty
Beiträge: 8394
Registriert: 24.08.2006, 02:28

Beitrag von Lighty »


Linux Kernel Security and Bugfix Update to 2.6.37.6

Diese Aktualisierung wird für eine Behebung eines mit dem Paket verbundenen Sicherheitsrisikos benötigt.
The openSUSE 11.4 kernel was updated to 2.6.37.6 fixing
lots of bugs and security issues.

Following security issues have been fixed: CVE-2011-1833:
Added a kernel option to ensure ecryptfs is mounting only
on paths belonging to the current ui, which would have
allowed local attackers to potentially gain privileges via
symlink attacks.

CVE-2011-2695: Multiple off-by-one errors in the ext4
subsystem in the Linux kernel allowed local users to cause
a denial of service (BUG_ON and system crash) by accessing
a sparse file in extent format with a write operation
involving a block number corresponding to the largest
possible 32-bit unsigned integer.

CVE-2011-3363: Always check the path in CIFS mounts to
avoid interesting filesystem path interaction issues and
potential crashes.

CVE-2011-2918: In the perf framework software event
overflows could deadlock or delete an uninitialized timer.

CVE-2011-3353: In the fuse filesystem,
FUSE_NOTIFY_INVAL_ENTRY did not check the length of the
write so the message processing could overrun and result in
a BUG_ON() in fuse_copy_fill(). This flaw could be used by
local users able to mount FUSE filesystems to crash the
system.

CVE-2011-2183: Fixed a race between ksmd and other memory
management code, which could result in a NULL ptr
dereference and kernel crash.

CVE-2011-3191: A signedness issue in CIFS could possibly
have lead to to memory corruption, if a malicious server
could send crafted replies to the host.


CVE-2011-1776: The is_gpt_valid function in
fs/partitions/efi.c in the Linux kernel did not check the
size of an Extensible Firmware Interface (EFI) GUID
Partition Table (GPT) entry, which allowed physically
proximate attackers to cause a denial of service
(heap-based buffer overflow and OOPS) or obtain sensitive
information from kernel heap memory by connecting a crafted
GPT storage device, a different vulnerability than
CVE-2011-1577.

Following non-security bugs were fixed:
- novfs: Unable to change password in the Novell Client for
Linux (bnc#713229).
- novfs: last modification time not reliable (bnc#642896).
- novfs: unlink directory after unmap (bnc#649625).
- fs: novfs: Fix exit handlers on local_unlink (bnc#649625).
- novfs: "Unable to save Login Script" appears when trying
to save a user login script (bnc#638985).
- fs: novfs: Limit check for datacopy between user and
kernel space.
- novfs: Fix checking of login id (bnc#626119).
- novfs: Set the sticky bit for the novfs mountpoint
(bnc#686412).

- ACPICA: Fix issues/fault with automatic "serialized"
method support (bnc#678097).

- drm/radeon/kms: Fix I2C mask definitions (bnc#712023).

- ext4: Fix max file size and logical block counting of
extent format file (bnc#706374).

- novfs: fix off-by-one allocation error (bnc#669378
bnc#719710).
- novfs: fix some kmalloc/kfree issues (bnc#669378
bnc#719710).
- novfs: fix some DirCache locking issues (bnc#669378
bnc#719710).

- memsw: remove noswapaccount kernel parameter (bnc#719450).

- Provide memory controller swap extension. Keep the
feature disabled by default. Use swapaccount=1 kernel
boot parameter for enabling it.

- Config cleanups: CONFIG_OLPC should be enabled only for
i386 non PAE

- TTY: pty, fix pty counting (bnc#711203).

- USB: OHCI: fix another regression for NVIDIA controllers
(bnc#682204).

- xen/blkfront: avoid NULL de-reference in CDROM ioctl
handling.

- x86, mtrr: lock stop machine during MTRR rendezvous
sequence (bnc#672008).

Weitere Informationen zu den Fehlerbereinigungen dieser Aktualisierung sind auf diesen Webseiten verfügbar:
• bug number 711539
• bug number 713229
• bug number 642896
• bug number 649625
• bug number 638985
• bug number 626119
• bug number 686412
• bug number 678097
• bug number 712023
• bug number 706374
• bug number 669378
• bug number 719710
• bug number 718028
• bug number 719450
• bug number 712366
• bug number 716901
• bug number 697901
• bug number 711203
• bug number 714001
• bug number 682204
• bug number 692784
• bug number 672008
Weitere Informationen zu dieser Sicherheitsaktualisierung sind auf diesen Webseiten verfügbar:
• CVE-2011-1833http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2695
http://cve.mitre.org/cgi-bin/cvename.cg ... -2011-3363
http://cve.mitre.org/cgi-bin/cvename.cg ... -2011-2918
http://cve.mitre.org/cgi-bin/cvename.cg ... -2011-3353
http://cve.mitre.org/cgi-bin/cvename.cg ... -2011-2183
http://cve.mitre.org/cgi-bin/cvename.cg ... -2011-3191
http://cve.mitre.org/cgi-bin/cvename.cg ... -2011-1776

Ein Neustart des Rechners wird für die Übernahme der Änderungen der Aktualisierung erforderlich.
Veraltete Pakete:
• kernel-desktop - 2.6.37.6-0.7.1
/• kernel-desktop - 2.6.37.1-1.2.2
/• kernel-desktop - 2.6.37.1-1.2.2
/• kernel-desktop - 2.6.37.6-0.7.1
/• kernel-desktop - 2.6.37.6-0.5.1
/• kernel-desktop - 2.6.37.6-0.7.1
/• kernel-desktop - 2.6.37.1-1.2.2
/• kernel-desktop - 2.6.37.6-0.9.1
/• kernel-desktop - 2.6.37.6-0.9.1
/• kernel-desktop - 2.6.37.6-0.5.1
LG, Lighty
Antworten

Zurück zu „News und Informationen ( LINUX )“