SuSE: 2011-038: Linux kernel Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: kernel
Announcement ID: SUSE-SA:2011:038
Date: Thu, 01 Sep 2011 15:00:00 +0000
Affected Products: SUSE Linux Enterprise High Availability Extension 11 SP1
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Server 11 SP1
Vulnerability Type: local kernel information leak
CVSS v2 Base Score: 1.9 (AV:L/AC:M/Au:N/C:P/I:N/A:N)
SUSE Default Package: yes
Cross-References: CVE-2010-3881, CVE-2011-1776, CVE-2011-2495
CVE-2011-2700, CVE-2011-2909, CVE-2011-2918
Content of This Advisory:
1) Security Vulnerability Resolved:
Linux kernel security update
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
The SUSE Linux Enterprise 11 Service Pack 1 kernel was updated to
2.6.32.45 and fixes various bugs and security issues.
Following security issues were fixed:
CVE-2011-1776: Timo Warns reported an issue in the Linux implementation
for GUID partitions. Users with physical access could gain access to
sensitive kernel memory by adding a storage device with a specially
crafted corrupted partition table.
CVE-2010-3881: The second part of this fix was not yet applied to our
kernel: arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does
not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory
via read operations on the /dev/kvm device.
CVE-2011-2495: The /proc/PID/io interface could be used by local
attackers to gain information on other processes like number of
password characters typed or similar.
CVE-2011-2700: A small buffer overflow in the radio driver si4713-i2c
was fixed that could potentially used by local attackers to crash
the kernel or potentially execute code.
CVE-2011-2909: A kernel information leak in the comedi driver from
kernel to userspace was fixed.
CVE-2011-2918: In the perf framework software event overflows could
deadlock or delete an uninitialized timer.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please reboot the machine after installing the update.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
"Online Update" module or the "zypper" commandline tool. The package and
patch management stack will detect which updates are required and
automatically perform the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
References