SuSE: Kernel update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SuSE Security Announcement
Package: kernel < 2.2.16
Date: Tue Jun 27 13:31:38 MEST 2000
Affected SuSE versions: 6.1-6.4
Vulnerability Type: local compromise of setuid applications
SuSE default package: yes
______________________________________________________________________________
A security hole was discovered in the package mentioned above.
Please update it as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).
Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.
Please note that we provide this information on an "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.
_____________________________________________________________________________
1. Problem Description
The implementation of the capability feature of the kernel 2.2.x < 2.2.16
is faulty.
2. Impact
This bug allows an local adversary to exploit certain setuid
applications to increase his/her privileges.
3. Solution
We are sorry about the late release of the new kernel, but the plain
2.2.16 kernel causes trouble with our patches and it also has a new
security hole. After we solved all these problems, we hope,
we could provide you with a more stable and more secure kernel.
Please, update the package from our FTP server.
(These RPMs could also be used by SuSE Releases < 6.4!)
The Alpha kernel will be released within the next days. The PPC kernel
could be build from lx_suse.rpm
_____________________________________________________________________________
Please verify these md5 checksums of the updates before installing:
i386 Kernel Images:
c089568d3d6a9f0826146f9204a37888 ftp.suse.com/pub/suse/i386/update/6.4/kernel-2.2.16/k_deflt.rpm
f454d629ccdf49e98fe759448ac1d34b ftp.suse.com/pub/suse/i386/update/6.4/kernel-2.2.16/k_eide.rpm
0c7111d249482920bb4a14a59ea1dbc2 ftp.suse.com/pub/suse/i386/update/6.4/kernel-2.2.16/k_i386.rpm
Laptop Kernel Images:
3faa2d00ab77ce0c336fc8fa9d4dee11 ftp.suse.com/pub/suse/i386/update/6.4/kernel-2.2.16/k_laptop.rpm
SMP Kernel Images:
45b9cd13f61e1cf0b82b8b2d847650c9 ftp.suse.com/pub/suse/i386/update/6.4/kernel-2.2.16/k_smp.rpm
SuSE Kernel Source Code:
41bde34659d93214af2cf5da6e7e2896 ftp.suse.com/pub/suse/i386/update/6.4/kernel-2.2.16/lx_suse.rpm
PPC Patches:
b9c8008eec0922a06c95be7c76f4da8e ftp.suse.com/pub/suse/i386/update/6.4/kernel-2.2.16/patch_collection.tar.gz
______________________________________________________________________________
Try the following web pages for a list of mirrors:
http://www.suse.de/ftp.html
Our webpage for patches:
http://www.suse.de/patches/index.html
Our webpage for security announcements:
http://www.suse.de/security
If you want to report vulnerabilities, please contact
security@suse.de
______________________________________________________________________________
SuSE has got two free security mailing list services to which any
interested party may subscribe:
suse-security@suse.com - moderated and for general/linux/SuSE
security discussions. All SuSE security
announcements are sent to this list.
suse-security-announce@suse.com - SuSE's announce-only mailing list.
Only SuSE's security annoucements are sent
to this list.
To subscribe to the list, send a message to:
References