Security update for Linux kernel (kernel-source)
(Last modified: 05MAY2003)
solutions Security update for Linux kernel (kernel-source) SuSE Linux Maintenance Web (0af576ad44f2b0194161469f1d8e2486)
kernel-source. It does not directly fix the vulnerability, but it provides the kernel sources for occasions where a kernel with differnent settings needs to be compiled, e.g. for tracking certain events.
The update fixes a security vulnerability in the Linux kernel (CAN-2003-0127) and contains fixes for high SMP workloads and ERP scenarios. The changes in detail are:
The vulnerability allows a local unprivileged attacker to
rootprivileges by using
combination with automatic kernel module loading on request, also known
As a temporary workaround, it is possible to disable the automatic loading of kernel modules by running the following command as user "
echo /no/such/file >/proc/sys/kernel/modprobe
This patch also includes improved argument checking for getting and setting the IEEE instruction pointer of the last floating point exception in the S/390 specific code to prevent possible crashes if it is wrongly used.
Restrictions for path-grouped DASDs
- Do not re-configure or re-cable path-grouped DASDs or path-grouped channel-attached tapes while the system is running, to avoid problems with path re-validation code.
- In such configuration the system may hang during re-boot. As a safe workaround use the "
halt" command and perform an
- Fix crashes in user access if the CPU already called schedule.
- Fix skipping of more than 511 blocks in the tape driver.
- Fix handling of memory allocation failures.
- Fix handling of user access return status with
- Fix codepage conversion with strings longer than 256 bytes.
- Fix handling of memory areas protected with
ptrace()ocking which could cause crashes/kernel hangs.
- Fix interrupt handling related to status pending condition.
- Fix path not operational detection using last path used mask.
- Fix lost interrupt because of zero basic sense data.
- Fix deadlock with all CPUs in
- Fix oops during dynamic addition of an FCP adapter..
- Fix TLB handling for high SMP workloads with heaps of threads.
- Fix possible user process crash or kernel oops because of 31-bit address space overflow.
- Fix too much logging for incoming ELS via
- Add info for DASD and QDIO into
- Fix ESS DASD support: Enhanced and fixed various ERP scenarios.
- Fix system hang caused by using
fdasdon unformatted devices.
- Fix Kernel panic when mounting an unformatted device.
- Fix handling of state change pending interrupts.
- Fix hang in
DASD_enable_rangesduring partition check with large empty ranges.
- Fix panic caused by pressing
Ctrl-Cduring format of a DASD device.
- Fix misdetection of DIAG devices as ECKD devices.
- Fix deadlock with dynamic attachment under VM.
- Fix long initialization time if
dasd=parameter is missing.
- Fix oops when disabling a DASD while formatting it.
- Fix a longstanding TCP problem that can lead to hanging ssh sessions.
- fix SMP races with hanging rsync processes and data loss on power failure.
- Fix possible data exposure and data corruption caused by abusing
statfsoverflow for huge NFS filesystems.
- Fix problem in
O_DIRECTimplementation when reading files with holes in it.
- Fix possible oops when trying to free pages in async I/O.
- Fix longstanding off-by-one error in
keventdinitialization that can lead to system freeze.
- Backport of tape driver from 2.4.19.
- Backport of crypto device driver from 2.4.19.
- Add Software Watchdog module.
- Add 3590 tape support.
This update includes the following IBM code drops:
- 2003-02-20 kernel 2.4.7 for the "August 2001 stream"
rpm -Fvh kernel-source.rpm
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.