Security update for Linux kernel
(Last modified: 15OCT2004)
solutions Security update for Linux kernel SuSE Linux Maintenance Web (aa3307227b8f22f728769659c9db4553)
Product(s): SUSE CORE 9 for AMD64 and Intel EM64T
- With the iptables firewall enabled in a certain configuration (as done by SuSEFirewall2) a handcrafted IP packet from a remote attacker could crash the machine.
- s390: The privileged "sacf" instruction was not correctly protected, so local users could gain root access.
- Some minor addition proc information leaks were fixed.
- 2 CD writing problems were fixed, one in BIO handling and one in highmem bounce buffer handling (machines with more than 1GB RAM).
- A problem with write barriers not being issued on IDE drives that default to write cache off was fixed.
- Make sure O_SYNC writes return -EIO for write errors.
- Some bio related fixes for the ASMlib kernel driver.
- Support for O_NOATIME in open(2) system call, fixing an LVM related problem.
- Do not clear/remove referenced pages in BLKFLSBUF ioctl.
- Fixed an iptables logging Oops caused by ifdown/ifup sequences.
- Do not propagate TCP errors to nfsd to avoid having nfsd dieing.
- Fixed some RAID 1 problems for read retry problems and device removal.
- Do not dirty inherited ACLs.
- Don't attach upper level SCSI drivers to raid control ports, such as the LSI/Engenio.
- Fixed a USB 2.0 EHCI problem with list scanning on SMP systems.
- Fixed a memory corruption in libata.
First, find out which kernel package to use, for example with
rpm -qf /boot/vmlinuz
Download the kernel image fitting your setup and install it with either:
- rpm -Fvh kernel-syms*.rpm kernel-default*.rpm for the default kernel image, or
- rpm -Fvh kernel-syms*.rpm kernel-smp*.rpm for the SMP kernel image
Finally, reboot the system with
shutdown -r now
to load the new kernel (replace "now" with the appropriate amount of time to allow local users to cleanly log out, for example "+5" for five minutes.)
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.