Security update for Linux Kernel (kernel-source)
(Last modified: 11DEC2002)
solutions Security update for Linux Kernel (kernel-source) SuSE Linux Maintenance Web (3251b60ee5cfb122238c7fb6ddca7a7a)
- Fix a problem in the tcp connection tracking code that could allow an attacker to make a machine unaccessible via the network for long time.
- Fix security issues in 3270 fullscreen driver and other drivers
- Fix problem with reparenting in thread group exit
- Fix the extension header parsing bugs in the IPv6 netfilter code
- Fix security hole in
- Discard SYN packets with the RST or FIN bit set; Linux would previously accept SYN packets with a RST or FIN bit set. This could be used to circumvent some packet filters who assume that these packets cannot open a new connection. This patch discards bogus SYN packets.
- Fix a theoretical race in the memory management (between
truncate()) - adds additional checks to be safe against it
- Fix race with LRU cache handling (also memory management)
- Fix swapoff bug because of unsafe dirty check
- Fix unsafe assert when freeing swap pages(could panic)
- Fix memory leak with swapon/swapoff
- Fix an
O_DIRECTread cornercase problem
- Fix possibly incorrect TLB flushing under extreme load and memory pressure
- Fix SMP race in
msgrcv(can be triggered only by extensive IPC usage)
- Fix rare ext3 data journaling race with truncate transactions
- Fix ext3 data journaling race where files could show foreign data
- Fix ext3 panic triggered when reading the partition while mounted
- Fix potential ext3 recovery problem: old data could be in the log
- Fixes for S/390 IO Layer problems:
- Fix hangs after a device is gone
- Fix hangs after a tape attach or attached tape is not recognized
- Fix fails to detect devices after 'not operational' messages
- Fix 32-bit Emulation of
recvmsg()system call timestamp conversion for input and out parameters
- Fix CTC not restarting after I/O errors
- Fix initialisation problems in the dasd discipline drivers
- Fix initialisation problems when setting up IUCV connections
- Fix the get block device size function of the xpram driver to i support XPRAM devices larger than 2GB
rpm -Uvh kernel-source.rpm
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.