Novell is now a part of Micro Focus

Security update for Linux kernel

Knowledgebase

(Last modified: 06DEC2005)


solutions Security update for Linux kernel
SuSE Linux Maintenance Web (268441775ca440ed04388897a55453d1)

Applies to

Package: kernel-default
kernel-iseries64
kernel-pmac64
kernel-pseries64
kernel-smp
kernel-source
kernel-syms
Product(s): SUSE CORE 9 for IBM POWER
Patch: patch-10778
Release: 20051206
Obsoletes: 76b31821f5458d44e4feaa31a71f7c0d

Indications

Everyone using the Linux Kernel on PPC architecture should update.

Contraindications

None.

Problem description

This kernel update contains several security fixes and some bugfixes, listed below:
Note: This is the last kernel update for the Service Pack 2 level kernel and contains a roll-up of PTF and security fixes.
It will be followed in 2 weeks by the kernel update for Service Pack 3, containing a lot of driver updates and features. Since you likely want to test Service Pack 3 extensively before deploying, this rollup update has been done for the time inbetween.
Parts of those fixes have already been released for the S/390 platforms.
It contains the following security fixes:
  • CVE-2005-3783: A check in ptrace(2) handling that finds out if a process is attaching to itself was incorrect and could be used by a local attacker to crash the machine.
  • CVE-2005-3784: A check in reaping of terminating child processes did not consider ptrace(2) attached processes and would leave a ptrace reference dangling. This could lead to a local user being able to crash the machine.
  • CVE-2005-2973: An infinite loop in the IPv6 UDP loopback handling can be easily triggered by a local user and lead to a denial of service.
  • CVE-2005-3806: A bug in IPv6 flowlabel handling code could be used by a local attacker to free non-allocated memory and in turn corrupt kernel memory and likely crash the machine.
  • CVE-2005-3055: Unplugging an userspace controlled USB device with an URB pending in userspace could crash the kernel. This can be easily triggered by local attacker.
  • CVE-2005-3180: Fixed incorrect padding in orinoco wireless driver, which could expose kernel data to the air.
  • CVE-2005-3044: Missing sockfd_put() calls in routing_ioctl() leaked file handles which in turn could exhaust system memory.
  • CVE-2005-3275: The NAT code in Linux kernel incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time.
  • CVE-2005-2490: A stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 and 2.4 allowed local users execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
  • CVE-2005-3110: A race condition in the ebtables netfilter module (ebtables.c), when running on an SMP system that is operating under a heavy load, might allow remote attackers to cause a denial of service (crash) via a series of packets that cause a value to be modified after it has been read but before it has been locked.
  • CVE-2005-1041: A race condition when reading the /proc/net/route virtual file could be used by a local attacker to potentially crash the machine.
  • CVE-2005-2800: A memory leak in the seq_file implemenetation in the SCSI procfs interface (sg.c) allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error.
  • CVE-2005-2872: The ipt_recent module when running on 64bit processors allows remote attackers to cause a DoS (kernel panic) via certain attacks such as SSH brute force.
It also contains the following bugfixes:
  • A memory leak in direct IO writing was fixed.
  • Hangs on error conditions on reiserfs with ACL and QUOTA enabled were fixed.
  • AMD64: A check for invalid page dirs in get_user_pages for vsyscall32 page was added.
  • Various OCFS2 fixes were applied and OCFS2 upgraded to 1.0.5.
  • Fixed the IP dst cache overrun problem.
  • Fixed kernel deadlocks on shrinking inode caches.
  • Make it possible to use the USB keyboard even with init=/bin/sh, by introducing a "usb-no-handoff" cmdline option.
  • Export the symbol do_posix_clock_monotonic_gettime for external kernel modules.
  • Removed a broken patch that could cause crashes on SCSI errors.
  • Some small CKRM fixes.
  • Fixed NFS xfs_iget shutdown.
  • Avoid a deadlock in the get_user_pages function.
  • Time occasionaly briefly jumps ahead 4294 seconds.
  • Fixed a 64 bit issue in PPP/MPPE.
  • Updated SIGKILL on OOM patch with suggestions by Kurt Garloff.
  • Fixed some reiserfs endianness bugs on big endian machines.
  • Added a Solaris VxFS compatibility fix in ACL handling.
  • Fixed premature expiry of async packets on the IEEE1394 bus.
  • Several XFS stability fixes were applied.
  • Fixed an Oops in ethtool calls when a bcm5700 driven network device is down.
  • Fixed a potential userspace memory corruption caused by the bcm5700 driver.
  • Fix an RPC string decoding problem in NFS/lockd.

Solution

Please install the updates provided at the location noted below.

Installation notes

This update is provided as an RPM package that can easily be installed onto a running system.
First, find out which kernel package to use, for example with
rpm -qf /boot/vmlinuz
Download the kernel image fitting your setup and install it with either:
  • rpm -Fvh kernel-syms*.rpm kernel-default*.rpm for the default kernel image, or
  • rpm -Fvh kernel-syms*.rpm kernel-iseries64*.rpm for the 64 bit iSeries kernel image, or
  • rpm -Fvh kernel-syms*.rpm kernel-pseries64*.rpm for the 64 bit pSeries kernel image, or
  • rpm -Fvh kernel-syms*.rpm kernel-smp*.rpm for the SMP kernel image, or
  • rpm -Fvh kernel-syms*.rpm kernel-pmac64*.rpm for the 64 bit PPC kernel image
Please do only install one of these kernels, not all of them.
After performing the RPM package update of your kernel package, you must execute the following commands as root to make sure that your system will start up again:
mk_initrd lilo
Finally, reboot the system with
shutdown -r now
to load the new kernel (replace "now" with the appropriate amount of time to allow local users to cleanly log out, for example "+5" for five minutes.)

links to download packages

Download Source Packages

Download the source code of the patches for maintained products.


Disclaimer

The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.

Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.

© Micro Focus