Security update for kernel-source
(Last modified: 11APR2003)
solutions Security update for kernel-source SuSE Linux Maintenance Web (3dd6d0bf897a0f13e2eb3d7349462273)
As a temporary workaround, it is possible to disable the automatic loading of kernel modules by running the following command as root:
echo /no/such/file > /proc/sys/kernel/modprobe
Note: This is the kernel source code only. To fix the problem you have to install in addition the appropriate kernel binary rpm for your machine, either kernel-ppc64 on pSeries or kernel-iseries64 on an iSeries system
In addition the following bugs are fixed:
- made nfs over udp more reliable (see corresponding SDB article for details)
- fixed problems with stability of nfs over tcp
- add ability to set ip-fragment timeout value per route (better safety for NFS over UDP)
- added various jfs fixes
- IPC calls reads are now reading the correct buffer length back after a write succeeded.
- better support for matrox dualhead cards, correct mirroring
- update in acenic driver
- fix 'lvm-mpd' panic
- fix the GLIBC test-fenv testcase
- eject function for iSeries viotape driver (#23736) LTC2020
- read lost boot hints for PReP boot loader
- fix machine check handler path to close a timing window.
- release semaphore on error path in viotape
- improve reset button support for entering KDB
- add iSeries DABR interface; add parens for PAGE defines
- fix endian bug in multicast group handling
- fix dead veth on iSeries when power down remote partition
- fix hang on iSeries virtual CD (dvd-ram)
- performance improvement for iSeries virtual CD
- various minor bugfixes
rpm -Uvh kernel-source.rpm
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.