openSUSE: 2012:0206-1: important: kernel
Description
The openSUSE 11.3 kernel was updated to fix various bugs and security issues. Following security issues have been fixed: CVE-2011-4604: If root does read() on a specific socket, it's possible to corrupt (kernel) memory over network, with an ICMP packet, if the B.A.T.M.A.N. mesh protocol is used. CVE-2011-2525: A flaw allowed the tc_fill_qdisc() function in the Linux kernels packet scheduler API implementation to be called on built-in qdisc structures. A local, unprivileged user could have used this flaw to trigger a NULL pointer dereference, resulting in a denial of service. CVE-2011-2699: Fernando Gont discovered that the IPv6 stack used predictable fragment identification numbers. A remote attacker could exploit this to exhaust network resources, leading to a denial of service. CVE-2011-2213: The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel did not properly audit INET_DIAG bytecode, which allowed loca...
Read the Full Advisory
Patch
Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.3: zypper in -t patch kernel-5605 To bring your system up-to-date, use "zypper patch".
Package List
- openSUSE 11.3 (i586 x86_64) [New Version: 2.6.34.10]: kernel-debug-2.6.34.10-0.6.1 kernel-debug-base-2.6.34.10-0.6.1 kernel-debug-devel-2.6.34.10-0.6.1 kernel-default-2.6.34.10-0.6.1 kernel-default-base-2.6.34.10-0.6.1 kernel-default-devel-2.6.34.10-0.6.1 kernel-desktop-2.6.34.10-0.6.1 kernel-desktop-base-2.6.34.10-0.6.1 kernel-desktop-devel-2.6.34.10-0.6.1 kernel-ec2-2.6.34.10-0.6.1 kernel-ec2-base-2.6.34.10-0.6.1 kernel-ec2-devel-2.6.34.10-0.6.1 kernel-ec2-extra-2.6.34.10-0.6.1 kernel-syms-2.6.34.10-0.6.1 kernel-trace-2.6.34.10-0.6.1 kernel-trace-base-2.6.34.10-0.6.1 kernel-trace-devel-2.6.34.10-0.6.1 kernel-vanilla-2.6.34.10-0.6.1 kernel-vanilla-base-2.6.34.10-0.6.1 kernel-vanilla-devel-2.6.34.10-0.6.1 kernel-xen-2.6.34.10-0.6.1 kernel-xen-base-2.6.34.10-0.6.1 kernel-xen-devel-2.6.34.10-0.6.1 preload-kmp-default-1.1_k2.6.34.10_0.6-19.1.37 preload-kmp-desktop-1.1_k2.6.34.10_0.6-19.1.37 - openSUSE 11.3 (noarch) [New Version: 2.6.34.10]: kernel-devel-2.6.34.10-0.6.1 kernel-source-2.6.34.10-0.6.1 kernel-source-vanilla-2.6.34.10-0.6.1 - openSUSE 11.3 (i586) [New Version: 2.6.34.10]: kernel-pae-2.6.34.10-0.6.1 kernel-pae-base-2.6.34.10-0.6.1 kernel-pae-devel-2.6.34.10-0.6.1 kernel-vmi-2.6.34.10-0.6.1 kernel-vmi-base-2.6.34.10-0.6.1 kernel-vmi-devel-2.6.34.10-0.6.1
References
https://www.suse.com/security/cve/CVE-2011-1576.html https://www.suse.com/security/cve/CVE-2011-1770.html https://www.suse.com/security/cve/CVE-2011-2203.html https://www.suse.com/security/cve/CVE-2011-2213.html https://www.suse.com/security/cve/CVE-2011-2525.html https://www.suse.com/security/cve/CVE-2011-2534.html https://www.suse.com/security/cve/CVE-2011-2699.html https://www.suse.com/security/cve/CVE-2011-2723.html https://www.suse.com/security/cve/CVE-2011-2898.html https://www.suse.com/security/cve/CVE-2011-4081.html https://www.suse.com/security/cve/CVE-2011-4604.html https://bugzilla.novell.com/691052 https://bugzilla.novell.com/692498 https://bugzilla.novell.com/698450 https://bugzilla.novell.com/699709 https://bugzilla.novell.com/700879 https://bugzilla.novell.com/702037 https://bugzilla.novell.com/707288 https://bugzilla.novell.com/709764 https://bugzilla.novell.com/710235 https://bugzilla.novell.com/726788 https://bugzilla.novell.com/728661 https://bugzilla.novell.com/735612 https://bugzilla.novell.com/736149