Security update for Linux kernel (kernel-source)
(Last modified: 05MAY2003)
solutions Security update for Linux kernel (kernel-source) SuSE Linux Maintenance Web (4c7cc6ad5e5e5d74b3f2c2843d572e1a)
SuSE Linux Enterprise Server 8 for IBM zSeries
kernel-sourcepackage and is only necessary if you compile your own kernel.
kernel-source. It does not directly fix the vulnerability, but it provides the kernel sources for occasions where a kernel with differnent settings needs to be compiled, e.g. for tracking certain events.
The update fixes a security vulnerability in the Linux kernel
(CAN-2003-0127) and contains fixes for high SMP workloads and ERP
scenarios. The changes in detail are:
The vulnerability allows a local unprivileged attacker to
rootprivileges by using
combination with automatic kernel module loading on request, also known
As a temporary workaround, it is possible to disable the automatic loading of kernel modules by running the following command as user "
echo /no/such/file >/proc/sys/kernel/modprobe
This patch also includes improved argument checking for getting and setting the IEEE instruction pointer of the last floating point exception in the S/390 specific code to prevent possible crashes if it is wrongly used.
Restrictions for Path Grouped DASDs
Do not reconfigure or re-cable path grouped DASDs or path grouped channel attached tapes while the system is running to avoid problems with the path revalidation code. Also, the system may hang during reboot as a result of these actions. As a safe workaround, shut the Linux system down with
shutdown -h nowand perform an IPL CLEAR after the changes.
S/390 specific fixes
- Fix interrupt handling related to status pending condition.
- Fix path not operational detection using last path used mask.
- Fix lost interrupt because of zero basic sense data.
- Fix deadlock with all CPUs in
- Fix oops on dynamic addition of an FCP adapter.
- Fix TLB handling for high SMP workloads with heaps of threads.
- Fix possible user process crash or kernel oops because of 31-bit address space overflow.
- Fix too much logging for incoming ELS via
- Fix ESS DASD support: Enhanced and fixed various ERP scenarios.
- Fix OSA features like broadcast after detaching the cable.
- Fix high load in many-to-one communication scenarios.
- Fix MAC decoding problem for VM Guest LAN interfaces (needs PTF UM30652, available for z/VM 4.3.0).
- Fix a longstanding TCP problem that can lead to hanging SSH sessions.
- fix SMP races with hanging
rsyncprocesses and data loss on power failure.
- Fix possible data exposure and data corruption caused by abusing
statfsoverflow for huge NFS filesystems.
- Fix problem in
O_DIRECTimplementation when reading files with holes in it.
- Fix possible oops when trying to free pages in async I/O.
- Fix longstanding off-by-one error in
keventdinitialization that can cause to system freeze.
- Add software watchdog module.
This update includes the IBM code drop '2003-02-03 kernel for the "May 2002 stream"'
rpm -Uvh kernel-source.rpm
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.