Security update for Linux kernel
(Last modified: 15OCT2004)
solutions Security update for Linux kernel SuSE Linux Maintenance Web (b2c0e543d119d888678183d358e12a86)
Product(s): SUSE CORE 9 for x86
- With the iptables firewall enabled in a certain configuration (as done by SuSEFirewall2) a handcrafted IP packet from a remote attacker could crash the machine.
- s390: The privileged "sacf" instruction was not correctly protected, so local users could gain root access.
- Some minor addition proc information leaks were fixed.
- 2 CD writing problems were fixed, one in BIO handling and one in highmem bounce buffer handling (machines with more than 1GB RAM).
- A problem with write barriers not being issued on IDE drives that default to write cache off was fixed.
- Make sure O_SYNC writes return -EIO for write errors.
- Some bio related fixes for the ASMlib kernel driver.
- Support for O_NOATIME in open(2) system call, fixing an LVM related problem.
- Do not clear/remove referenced pages in BLKFLSBUF ioctl.
- Fixed an iptables logging Oops caused by ifdown/ifup sequences.
- Do not propagate TCP errors to nfsd to avoid having nfsd dieing.
- Fixed some RAID 1 problems for read retry problems and device removal.
- Do not dirty inherited ACLs.
- Don't attach upper level SCSI drivers to raid control ports, such as the LSI/Engenio.
- Fixed a USB 2.0 EHCI problem with list scanning on SMP systems.
- Fixed a memory corruption in libata.
- i386: Avoid userspace corruption during COWs with threads on x86 bigsmp (PAE enabled) systems with more than 4G of RAM.
First, find out which kernel package to download and use, for example with
rpm -qf /boot/vmlinuz
Download the kernel image fitting your setup and the kernel symbols (kernel-syms*.rpm) and install it with either:
- rpm -Fvh kernel-syms*.rpm kernel-default*.rpm for the default kernel image, or
- rpm -Fhv kernel-syms*.rpm kernel-smp*.rpm for the SMP kernel image with support for up to 64 GB, or
- rpm -Fhv kernel-syms*.rpm kernel-bigsmp*.rpm for the SMP kernel image with support for up to 64 GB
In case you are using LILO as bootmanager, please make sure that you also execute the command
after installing the update for the system to remain bootable.
Finally, reboot the system with
shutdown -r now
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.