SuSE: 2010-044: SUSE Linux Enterprise 10 SP3 kernel Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: kernel
Announcement ID: SUSE-SA:2010:044
Date: Thu, 23 Sep 2010 15:00:00 +0000
Affected Products: SLE SDK 10 SP3
SUSE Linux Enterprise Desktop 10 SP3
SUSE Linux Enterprise Server 10 SP3
Vulnerability Type: local privilege escalation
CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
SUSE Default Package: yes
Cross-References: CVE-2010-2955, CVE-2010-3078, CVE-2010-3081
CVE-2010-3297
Content of This Advisory:
1) Security Vulnerability Resolved:
Linux kernel security problems
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
This kernel update for the SUSE Linux Enterprise 10 SP3 kernel fixes
several critical security issues.
Following security issues were fixed:
CVE-2010-3081: Incorrect buffer handling in the biarch-compat buffer
handling could be used by local attackers to gain root privileges. This
problem affects foremost x86_64, or potentially other biarch platforms,
like PowerPC and S390x.
CVE-2010-2955: A kernel information leak via the WEXT ioctl was fixed.
CVE-2010-3078: A kernel information leak via the XFS filesystem
was fixed.
CVE-2010-3297: A kernel information leak in the net eql code was fixed.
Additionally a non-security bug regarding data corruption bug in s390
was fixed:
A race between /proc/pid/stat and fork in the S390 kernel could lead
to data corruption.
The SUSE Linux Enterprise 10 SP 3 kernel is not affected by the issue in
CVE-2010-3301, as the bad change was only introduced in the 2.6.27 kernel.
The SUSE Linux Enterprise 10 SP 3 kernel is not affected by the issue in
CVE-2010-2959, as the "can_bcm" module was only introduced in 2.6.25
kernel.
No other bugs were fixed by this update.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please reboot the machine after installing the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
References