SuSE: 2010-045: SUSE Linux Enterprise 11 SP1 kernel Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: kernel
Announcement ID: SUSE-SA:2010:045
Date: Thu, 23 Sep 2010 15:00:00 +0000
Affected Products: SUSE Linux Enterprise High Availability Extension 11 SP1
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Server 11 SP1
Vulnerability Type: local privilege escalation
CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
SUSE Default Package: yes
Cross-References: CVE-2010-2955, CVE-2010-3081, CVE-2010-3084
CVE-2010-3301
Content of This Advisory:
1) Security Vulnerability Resolved:
Linux kernel security problem
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
This update of the SUSE Linux Enterprise Server 11 SP1 kernel fixes
various critical security bugs.
Following security bugs were fixed:
CVE-2010-3301: Mismatch between 32bit and 64bit register usage in the
system call entry path could be used by local attackers to gain root
privileges. This problem only affects x86_64 kernels.
CVE-2010-3081: Incorrect buffer handling in the biarch-compat buffer
handling could be used by local attackers to gain root privileges. This
problem affects foremost x86_64 kernels and potentially other biarch
platforms, like PowerPC and S390x.
CVE-2010-3084: A buffer overflow in the ETHTOOL_GRXCLSRLALL code
could be used to crash the kernel or potentially execute code.
CVE-2010-2955: A kernel information leak via the WEXT ioctl was fixed.
Additionally a non-security bug regarding data corruption bug in s390
was fixed:
A race condition between /proc/pid/stat and fork in the S390 kernel
would lead to data corruption.
No other bugs were fixed in this update.
The SUSE Linux Enterprise 11 SP 1 kernel was already updated previously
to fix the CVE-2010-2959 security issue.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please reboot the machine after installing the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
References