Security update for Linux kernel
Knowledgebase
(Last modified: 29JUL2005)
solutions Security update for Linux kernel SuSE Linux Maintenance Web (b3d76bae3ffcf76948bbfbfd5dbe2685)
kernel-smp
kernel-source
kernel-syms
Product(s): SUSE CORE 9 for AMD64 and Intel EM64T
Novell Linux Desktop 9 for x86_64
Patch: patch-10379
Release: 20050729
Obsoletes: 33212fcace6173e6983169abae175d32
012927c610add3677c52ec3a28a1648d
x86_64:
- by causing an overflow in the 32bit execve function users could crash the kernel or even execute code (#90499, CAN-2005-1768).
- by causing an overflow in the 32bit execve function users could crash the kernel or even execute code (#90499, CAN-2005-1768).
- deadlock in reiserfs
- NFS problems with EMC servers (#96193)
- hang on deleting vlan interfaces (#83493)
- busy inodes after umount of autofs4 (#91112)
- JBD race condition during umount (#95665)
- output of /proc/scsi/scsi (#80228)
- ignore timer overrides on SMP Nvidia boards (#94194)
- crash on dual core, single processor Opterons (#96485)
- initialization of the ACPI Processor P-States Driver (#95059)
- initialization of the ACPI Processor P-States Driver (#95059)
- kernel parameter noexec=on did't work (#96528)
- include IBM codedrop 2005-07-20
rpm -Fvh kernel-*.rpm
In case you are using LILO as bootmanager, please make sure that you also execute the command
lilo
after installing the update for the system to remain bootable.
Finally, reboot the system with
shutdown -r now
Download Source Packages
Download the source code of the patches for maintained products.
Disclaimer
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.