SuSE: 2010-010: Linux kernel Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: kernel
Announcement ID: SUSE-SA:2010:010
Date: Mon, 08 Feb 2010 16:00:00 +0000
Affected Products: openSUSE 11.2
Vulnerability Type: remote denial of service
CVSS v2 Base Score: 6.8 (AV:A/AC:L/Au:N/C:N/I:P/A:C)
SUSE Default Package: yes
Cross-References: CVE-2009-3939, CVE-2009-4141, CVE-2009-4536
CVE-2009-4538, CVE-2010-0003, CVE-2010-0006
CVE-2010-0007, CVE-2010-0299
Content of This Advisory:
1) Security Vulnerability Resolved:
Linux kernel security update
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
This update of the openSUSE 11.2 kernel brings the kernel to version
2.6.31.12 and contains a lot of bug and security fixes.
CVE-2010-0299: The permission of the devtmpfs root directory
was incorrectly 1777 (instead of 755). If it was used, local
attackers could escalate privileges.
(openSUSE 11.2 does not use this filesystem by default).
CVE-2009-3939: The poll_mode_io file for the megaraid_sas driver in
the Linux kernel 2.6.31.6 and earlier has world-writable permissions,
which allows local users to change the I/O mode of the driver by
modifying this file.
CVE-2010-0007: ebtables was lacking a CAP_NET_ADMIN check, making
it possible for local unprivileged attackers to modify the network
bridge management.
CVE-2010-0003: An information leakage on fatal signals on x86_64
machines was fixed.
CVE-2009-4141: A race condition in fasync handling could be used by
local attackers to crash the machine or potentially execute code.
CVE-2010-0006: The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in
the Linux kernel before 2.6.32.4, when network namespaces are enabled,
allows remote attackers to cause a denial of service (NULL pointer
dereference) via an invalid IPv6 jumbogram.
CVE-2009-4536: drivers/net/e1000/e1000_main.c in the e1000 driver in
the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that
exceed the MTU by processing certain trailing payload data as if it
were a complete frame, which allows remote attackers to bypass packet
filters via a large packet with a crafted payload.
CVE-2009-4538: drivers/net/e1000e/netdev.c in the e1000e driver in
the Linux kernel 2.6.32.3 and earlier does not properly check the
size of an Ethernet frame that exceeds the MTU, which allows remote
attackers to have an unspecified impact via crafted packets.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please reboot the machine after installing the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
References