SuSE: 2007-029: Linux kernel Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: kernel
Announcement ID: SUSE-SA:2007:029
Date: Thu, 03 May 2007 18:00:00 +0000
Affected Products: openSUSE 10.2
Vulnerability Type: remote denial of service
Severity (1-10): 7
SUSE Default Package: yes
Cross-References: CVE-2007-1000, CVE-2007-1357, CVE-2007-1388
CVE-2007-1592
Content of This Advisory:
1) Security Vulnerability Resolved:
kernel security update and bootloader fixes
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
This kernel update for openSUSE 10.2 fixes the following security problems:
- CVE-2007-1000 A NULL pointer dereference in the IPv6 sockopt handling
could potentially be used by local attackers to read
arbitrary kernel memory and thereby gain access to
private information.
- CVE-2007-1388 A NULL pointer dereference could be used by local attackers to cause a Oops / crash of the machine.
- CVE-2007-1592 A possible double free in the IPv6/flowlabel handling was
fixed.
- CVE-2007-1357 A remote denial of service attack in the AppleTalk protocol
handler was fixed. This attack is only possible on the local
subnet, and requires the AppleTalk protocol module to be loaded
(which is not done by default).
This update also reenables the deprecated CONFIG_USB_DEVICEFS option
for legacy applications. It is not necessary to recompile the kernel
to use USB devices in VMWare and VirtualBox and other programs using
the old /proc/bus/usb interface.
You still need to mount /proc/bus/usb if required by doing:
mount -t usbfs none /proc/bus/usb
or configuring it in /etc/fstab. The programs included in openSUSE 10.2
do not require this legacy interface.
This update also includes a new perl-Bootloader package which fixes various
regressions in the boot menu generation during update of kernels.
Please note that boot entries will be named:
openSUSE 10.2 - Linux 2.6.18.5-0.2
now and that you can install multiple kernels in parallel.
The update also fixes the following non security bugs:
- patches.fixes/visor_write_race.patch:
fix race allowing overstepping memory limit in visor_write (Mainline: 2.6.21)
- patches.drivers/libata-ide-via-add-PCI-IDs:
via82cxxx/pata_via: backport PCI IDs (254158).
- libata: implement HDIO_GET_IDENTITY (255413).
- sata_sil24: Add Adaptec 1220SA PCI ID. (Mainline: 2.6.21)
- ide: backport hpt366 from devel tree (244502).
- mm: fix madvise infinite loop (248167).
- libata: hard reset on SERR_INTERNAL (241334).
- limited WPA support for prism54 (207944)
- jmicron: match class instead of function number (224784, 207707)
- ahci: RAID mode SATA patch for Intel ICH9M (Mainline: 2.6.21)
- libata: blacklist FUJITSU MHT2060BH for NCQ (Mainline: 2.6.21)
- libata: add missing PM callbacks. (Mainline: 2.6.20)
- patches.fixes/nfs-readdir-timestamp:
Set meaningful value for fattr->time_start in readdirplus
results. (244967).
- patches.fixes/usb_volito.patch:
wacom volito tablet not working (#248832).
- patches.fixes/965-fix: fix detection of aperture size versus
GTT size on G965 (#258013).
- patches.fixes/sbp2-MODE_SENSE-fix.diff: use proper MODE SENSE,
fixes recognition of device properties (261086)
- patches.fixes/ipt_CLUSTERIP_refcnt_fix:
ipv4/netfilter/ipt_CLUSTERIP.c - refcnt fix (238646)
- patches.fixes/reiserfs-fix-vs-13060.diff: reiserfs: fix
corruption with vs-13060 (257735).
- patches.drivers/ati-rs400_200-480-disable-msi: pci-quirks:
disable MSI on RS400-200 and RS480 (263893).
- patches.drivers/libata-ahci-ignore-interr-on-SB600: ahci.c:
workaround for SB600 SATA internal error issue (#264792).
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please reboot the machine after the upgrade.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
References