LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 15th, 2014
Linux Security Week: September 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
SuSE: kernel (SUSE-SA:2006:028) Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
SuSE Multiple vulnerabilities have been fixed in the linux kernel.
______________________________________________________________________________

                        SUSE Security Announcement

        Package:                kernel
        Announcement ID:        SUSE-SA:2006:028
        Date:                   Wed, 31 May 2006 18:00:00 +0000
        Affected Products:      SUSE LINUX 10.0
                                SUSE LINUX 9.3
                                SUSE LINUX 9.2
                                SUSE LINUX 9.1
                                SuSE Linux Desktop 1.0
                                SuSE Linux Enterprise Server 8
                                SUSE SLES 9
                                UnitedLinux 1.0
        Vulnerability Type:     remote denial of service
        Severity (1-10):        7
        SUSE Default Package:   yes
        Cross-References:       CVE-2005-4798, CVE-2006-0095, CVE-2006-0457
                                CVE-2006-0554, CVE-2006-0555, CVE-2006-0557
                                CVE-2006-0741, CVE-2006-0742, CVE-2006-0744
                                CVE-2006-1055, CVE-2006-1056, CVE-2006-1242
                                CVE-2006-1342, CVE-2006-1523, CVE-2006-1524
                                CVE-2006-1525, CVE-2006-1527, CVE-2006-1863
                                CVE-2006-1864, CVE-2006-2271, CVE-2006-2272
                                CVE-2006-2274

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             various kernel security problems
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report.
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   The Linux kernel has been updated to fix various security problems,
   listed below.

   Note that some of the updates have already been released end of last
   week.

   - AppArmor in SUSE Linux 10.0 and SUSE Linux Enterprise Server 9 SP3
     could crash the machine by an negative dentry reference due to
     for instance vanishing path component during a system call of a
     profiled application.

   - AppArmor in SUSE Linux 10.0 and SUSE Linux Enterprise Server 9 SP3
     failed to prevent PTRACE_ME on a confined parent, allowing an
     infected called program to gain the same rights as its parent
     process.

   - CVE-2006-2274: Linux SCTP allows remote attackers to cause a
     denial of service (infinite recursion and crash) via a packet that
     contains two or more DATA fragments, which causes an skb pointer
     to refer back to itself when the full message is reassembled,
     leading to infinite recursion in the sctp_skb_pull function.

   - CVE-2006-2272: Linux SCTP allowed remote attackers to cause a
     denial of service (kernel panic) via incoming IP fragmented (1)
     COOKIE_ECHO and (2) HEARTBEAT SCTP control chunks.

   - CVE-2006-2271: The ECNE chunk handling in Linux SCTP allowed
     remote attackers to cause a denial of service (kernel panic) via
     an unexpected chunk when the session is in CLOSED state.

   - CVE-2006-1864: Due to incorrect argument checking it was possible
     to break out of chroots on smbfs file systems.

   - CVE-2006-1863: Due to incorrect argument checking it was possible
     to break out of chroots on cifs file systems.

   - CVE-2006-1527: NETFILTER SCTP conntrack: Fixed an infinite loop
     in sctp handling, which could be caused by a remote attacker.

   - CVE-2006-1525: IPV4: Fixed a machine crash in ip_route_input that
     could be triggered via the "route" command from local attackers.

   - CVE-2006-1524: shmat: stop mprotect from giving write permission
     to a read-only shared memory attachment.

   - CVE-2006-1523: __group_complete_signal: Removed a bogus BUG_ON which
     could lead to unwanted process crashes.

   - CVE-2006-1342: A minor information leak in SO_ORIGINAL_DST was fixed.

   - CVE-2006-1242: Fix IPv4 IPID generation to avoid possible idle scans
     against the machine.

   - CVE-2006-1056: i386/x86-64: Fix AMD x87 information leak between
     processes.

   - CVE-2006-1055: sysfs: Zero terminate sysfs write buffers.

   - CVE-2006-0744: When the user could have changed %RIP always force IRET.

   - CVE-2006-0742: IA64 only: Don't declare die_if_kernel as noreturn,
     otherwise local attackers can crash the machine.

   - CVE-2006-0741: x86_64 only: Always check that RIPs are canonical
     during signal handling, otherwise local attackers could crash
     the machine.

   - CVE-2006-0557: Add an upper boundary to mempolicy node arguments
     to avoid potentially local crashes.

   - CVE-2006-0555: A normal user was able to panic the NFS client with
     direct I/O.

   - CVE-2006-0554: A XFS ftruncate() bug could expose stale data.

   - CVE-2006-0457: A race condition in the add_key, request_key,
     and keyctl functions allows local users to cause a denial of service
     (crash) or read sensitive kernel memory by modifying the length of
     a string argument between the time that the kernel calculates the
     length and when it copies the data into kernel memory.
     (Please Note that keyctls are not enabled in SUSE Linux up to 10.0).

   - CVE-2006-0095: dm-crypt: Zero key before freeing it to avoid leakage.

   - CVE-2005-4798: Creation of long symlinks on the NFS server could
     crash the client machine.


   Additionally some non security bug fixes include:

   - Lots of bugfixes in the SUSE Linux Enterprise 9 and SUSE Linux
     9.1 kernel.

   - The S/390 tape driver is now opensource and the previous oco drivers
     are no longer supported.

2) Solution or Work-Around

   There is no known workaround, please install the update packages.

3) Special Instructions and Notes

     SPECIAL INSTALLATION INSTRUCTIONS
     =================================
     The following paragraphs guide you through the installation
     process in a step-by-step fashion. The character sequence "****"
     marks the beginning of a new paragraph. In some cases, the steps
     outlined in a particular paragraph may or may not be applicable
     to your situation. Therefore, make sure that you read through
     all of the steps below before attempting any of these
     procedures. All of the commands that need to be executed must be
     run as the superuser 'root'. Each step relies on the steps
     before it to complete successfully.


   **** Step 1: Determine the needed kernel type.

     Use the following command to determine which kind of kernel is
     installed on your system:

       rpm -qf --qf '%{name}\n' /boot/vmlinuz


   **** Step 2: Download the packages for your system.

     Download the kernel RPM package for your distribution with the
     name indicated by Step 1. Starting from SUSE LINUX 9.2, kernel
     modules that are not free were moved to a separate package with
     the suffix '-nongpl' in its name. Download that package as well
     if you rely on hardware that requires non-free drivers, such as
     some ISDN adapters. The list of all kernel RPM packages is
     appended below.

     The kernel-source package does not contain a binary kernel in
     bootable form. Instead, it contains the sources that correspond
     with the binary kernel RPM packages. This package is required to
     build third party add-on modules.


   **** Step 3: Verify authenticity of the packages.

     Verify the authenticity of the kernel RPM package using the
     methods as listed in Section 6 of this SUSE Security
     Announcement.


   **** Step 4: Installing your kernel rpm package.

     Install the rpm package that you have downloaded in Step 2 with
     the command

         rpm -Uhv 

     replacing  with the filename of the RPM package
     downloaded.

     Warning: After performing this step, your system may not boot
              unless the following steps have been followed
   	     completely.


   **** Step 5: Configuring and creating the initrd.

     The initrd is a RAM disk that is loaded into the memory of your
     system together with the kernel boot image by the boot loader.
     The kernel uses the content of this RAM disk to execute commands
     that must be run before the kernel can mount its root file
     system. The initrd is typically used to load hard disk
     controller drivers and file system modules. The variable
     INITRD_MODULES in /etc/sysconfig/kernel determines which kernel
     modules are loaded in the initrd.

     After a new kernel rpm has been installed, the initrd must be
     recreated to include the updated kernel modules. Usually this
     happens automatically when installing the kernel rpm. If
     creating the initrd fails for some reason, manually run the
     command

       /sbin/mkinitrd


   **** Step 6: Update the boot loader, if necessary.

     Depending on your software configuration, you either have the
     LILO or GRUB boot loader installed and initialized on your
     system. Use the command

       grep LOADER_TYPE /etc/sysconfig/bootloader

     to find out which boot loader is configured.

     The GRUB boot loader does not require any further action after a
     new kernel has been installed. You may proceed to the next step
     if you are using GRUB.

     If you use the LILO boot loader, lilo must be run to
     reinitialize the boot sector of the hard disk. Usually this
     happens automatically when installing the kernel RPM. In case
     this step fails, run the command

       /sbin/lilo


     Warning: An improperly installed boot loader will render your
              system unbootable.


   **** Step 7: Reboot.

     If all of the steps above have been successfully completed on
     your system, the new kernel including the kernel modules and the
     initrd are ready to boot. The system needs to be rebooted for
     the changes to be active. Make sure that all steps have been
     completed then reboot using the command

       /sbin/shutdown -r now

     Your system will now shut down and restart with the new kernel.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv 

   to apply the update, replacing  with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/Intel-536ep-4.69-14.5.i586.rpm
          3a83b6b2ac93a33ccbef968f91ea1599
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-2.6.13-15.10.i586.rpm
          82d114ebbb80523fcc9c772f15f5bf59
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-nongpl-2.6.13-15.10.i586.rpm
          00b0c272a99a222cdaa8ed2932ed4e72
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-2.6.13-15.10.i586.rpm
          9b6a9c3f4b6e848a22032d6aa60e01ed
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-nongpl-2.6.13-15.10.i586.rpm
          cd834d6bfffe716eb0ba7f65835da3b3
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-2.6.13-15.10.i586.rpm
          6b6a48bdd2acaae2a17006a3266ceb1d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-nongpl-2.6.13-15.10.i586.rpm
          08a960b9f08a18b70cf932ed49bce39c
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-source-2.6.13-15.10.i586.rpm
          f5439ee02ca40c4fb123d15a43082390
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-syms-2.6.13-15.10.i586.rpm
          50556d3b9f06e2a850f16cc37260ae02
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-2.6.13-15.10.i586.rpm
          5546aa0f75ac02c60a98c8530182b125
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-nongpl-2.6.13-15.10.i586.rpm
          4379e54d1bb5da4a0145f18e15a50ebe
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-2.6.13-15.10.i586.rpm
          4a6b8022c5e785ab2da2be4a872baf52
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-nongpl-2.6.13-15.10.i586.rpm
          5c0566baf35363ca22af29bd61bc6117
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/um-host-kernel-2.6.13-15.10.i586.rpm
          15b889451fd0837cd117c9e4b7adf1ab

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/Intel-536ep-4.69-10.6.i586.rpm
          2410d834eab16f1626457bb02b2a1a74
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-2.6.11.4-21.12.i586.rpm
          92d05ecd1c3b69768129ec48f857003c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-nongpl-2.6.11.4-21.12.i586.rpm
          c7d85941249af8919e53fb114f64d9ab
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-2.6.11.4-21.12.i586.rpm
          2ca07b757a0ecbdc2ae162fdbb74fe84
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-nongpl-2.6.11.4-21.12.i586.rpm
          abe9aef7428dcae8d4cb6e10e9160250
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-2.6.11.4-21.12.i586.rpm
          d2881e4ce268834485cc6109d0f053c3
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-nongpl-2.6.11.4-21.12.i586.rpm
          48c6295b8f68d5c80a9f3fbeef1edcc3
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-source-2.6.11.4-21.12.i586.rpm
          a564139b3c87831391474cb9c745ab52
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-syms-2.6.11.4-21.12.i586.rpm
          fce134e65cf241b2c41051af535f9fa5
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-2.6.11.4-21.12.i586.rpm
          174c52764d54f03a47406d0a01370e25
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-nongpl-2.6.11.4-21.12.i586.rpm
          4e0495322a4b2f38da8265df47051c43
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-2.6.11.4-21.12.i586.rpm
          072e3bf41cab06360bd87c30bfb0b15a
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-nongpl-2.6.11.4-21.12.i586.rpm
          1a644cf0d30553f845c44767d009e8d2
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/ltmodem-8.31a10-7.6.i586.rpm
          af5d6fdbcdcf67b15780cfabd6bde63d
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-install-initrd-1.0-50.6.i586.rpm
          eb1ec5422e5dda9558fa8367ff042901
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-kernel-2.6.11.4-21.12.i586.rpm
          5b7745b79e8bd19e42d68628889daa1a

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/Intel-536ep-4.69-5.14.i586.rpm
          b117fe5ca34185091a50c7f2bf17b8c5
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-2.6.8-24.21.i586.rpm
          e6fcd60b751a8811fe3264a5423dddf4
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-nongpl-2.6.8-24.21.i586.rpm
          fe6b529d2ede5d43301db7a8ab12f9bf
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-2.6.8-24.21.i586.rpm
          30f59434537cee4176b2511ed2875184
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-nongpl-2.6.8-24.21.i586.rpm
          ef6a69c4982c498bf4f2855a75047f38
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-2.6.8-24.21.i586.rpm
          a3f3ce1148b2f94997108da61ab640a8
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-nongpl-2.6.8-24.21.i586.rpm
          56791a070623ab550e71a14ee329a412
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-source-2.6.8-24.21.i586.rpm
          cead4b081e6a01e0848ec26f652c9b8a
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-syms-2.6.8-24.21.i586.rpm
          c4e9b67ee0740d86e1565c3aaa4ac250
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-2.6.8-24.21.i586.rpm
          854c60aea3df5d4671bf8d902d842214
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-nongpl-2.6.8-24.21.i586.rpm
          e5e1fdcfb20887ca944be07e1ffd5835
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/ltmodem-8.31a8-6.14.i586.rpm
          ffe2733bb885439897af61680dfa386d
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-install-initrd-1.0-48.13.i586.rpm
          ddbb39bfa6ddec0079e57fb378465346
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-kernel-2.6.8-24.21.i586.rpm
          f98c69a01d4a93d1e3f7eb4a0f81a481

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6.5-7.257.i586.rpm
          d19076aa179801c307fd137ebe10900f
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2.6.5-7.257.i586.rpm
          4a25e927ab95b0173cfafa394f91f207
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.5-7.257.i586.rpm
          677290d102ac4b238f7c6dd12808f554
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-source-2.6.5-7.257.i586.rpm
          fadc7d71a944ad5e1c3857cc0910cde1
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.5-7.257.i586.rpm
          7aeeb6366b2528975004d21e17e1453e
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/ltmodem-2.6.2-38.23.i586.rpm
          93611206083c3d867d7f8e697e0b9683

   Platform Independent:

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/noarch/kernel-docs-2.6.11.4-21.12.noarch.rpm
          c2c3264f47360840d988a878845e0280

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/noarch/kernel-docs-2.6.8-24.21.noarch.rpm
          0c39c810d06835f4e4b4ba3b5283d5e3

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.257.noarch.rpm
          e5c63b4d0d11b19d198b08646c2bfa89
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.257.noarch.rpm
          ec17f895636cda948927ca6a37e5f990

   Power PC Platform:

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-default-2.6.13-15.10.ppc.rpm
          063b606929bec2b369675009b654c2b3
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-iseries64-2.6.13-15.10.ppc.rpm
          ae9e7b8c030d846dbebd2185d6dc233d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-ppc64-2.6.13-15.10.ppc.rpm
          922320a95ab56d93147306c6f2a1a0b5
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-source-2.6.13-15.10.ppc.rpm
          ff773fb617e428ad9cb8ccf9e8acccfb
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-syms-2.6.13-15.10.ppc.rpm
          3853da634e2914f6952fbf7378ee050a

   x86-64 Platform:

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-2.6.13-15.10.x86_64.rpm
          f6743cde2b350ff70eb251c855515702
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-nongpl-2.6.13-15.10.x86_64.rpm
          074b1a8d73ddad88067690c46bddddb4
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-2.6.13-15.10.x86_64.rpm
          268b29a0654711992b9583e8528d175a
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-nongpl-2.6.13-15.10.x86_64.rpm
          f6986f14c6f800b7794569b9543f4ffa
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-source-2.6.13-15.10.x86_64.rpm
          696e7f31a7269890f44338b9c81e8614
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-syms-2.6.13-15.10.x86_64.rpm
          d2a85c7eba759d921ceb760b670e24d4
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-2.6.13-15.10.x86_64.rpm
          d1a572732edce8d2163b84d9eb2a6151
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-nongpl-2.6.13-15.10.x86_64.rpm
          ebbadcab9a3b67e58e430a6819c8214d

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-2.6.11.4-21.12.x86_64.rpm
          26fd19dd2b4b76545cb9a2d7d1206980
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-nongpl-2.6.11.4-21.12.x86_64.rpm
          ff1adebf486711688f6d8ec25a2c8442
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-2.6.11.4-21.12.x86_64.rpm
          c7b1d557bf3980023d4be44ffb51029b
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-nongpl-2.6.11.4-21.12.x86_64.rpm
          66ca05be8638d26d85c5335d8b453770
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-source-2.6.11.4-21.12.x86_64.rpm
          a4a01f6e186586ab97eb09cf81f8f71c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-syms-2.6.11.4-21.12.x86_64.rpm
          ba55d640082d2d2288e4e01f07f9f48e

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-2.6.8-24.21.x86_64.rpm
          7598a1386bff406c10732459ad7daf3f
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-nongpl-2.6.8-24.21.x86_64.rpm
          ee103b10429dbedf672e42a6d783d487
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-2.6.8-24.21.x86_64.rpm
          b05fceea2901e5519b5c9e97f9a05422
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-nongpl-2.6.8-24.21.x86_64.rpm
          f1da6bf6bb890f23ec43099beeb8fc33
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-source-2.6.8-24.21.x86_64.rpm
          a35e63ed009211c0f56b45f2663e9f10
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-syms-2.6.8-24.21.x86_64.rpm
          583513d1ae02adb0581331be8caca884

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-default-2.6.5-7.257.x86_64.rpm
          52a626483d1c45c5083ba02cdce0ccdf
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2.6.5-7.257.x86_64.rpm
          b4a1fdb2f84017168e646b2b36b46049
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-source-2.6.5-7.257.x86_64.rpm
          7a095385c5f2a11e5c6f277d006d9b60
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2.6.5-7.257.x86_64.rpm
          a7d92f0e5fe3a79803b43b8dc32b96be

   Sources:

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/Intel-536ep-4.69-14.5.src.rpm
          a7b4d8a829b820bf31b1b7ea8fb515a6
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-bigsmp-2.6.13-15.10.nosrc.rpm
          b18631694f0c4a90f7998017a0686da0
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-default-2.6.13-15.10.nosrc.rpm
          8d41d57e04f90958209039bc0e862152
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-iseries64-2.6.13-15.10.nosrc.rpm
          97b6bc393384ea961075ecf3f101fb83
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-ppc64-2.6.13-15.10.nosrc.rpm
          acdfc8e7aef4da43b4c527efe1df62f3
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-smp-2.6.13-15.10.nosrc.rpm
          cbcfb3e48d275ed33597314608dd3737
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.10.nosrc.rpm
          679f570d3af962b4ba92c69be0128f24
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.10.src.rpm
          605aa540269d6c3bee3bee1b7b505301
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-syms-2.6.13-15.10.src.rpm
          c01dd8279fa7899d8d21d84517aa4459
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-um-2.6.13-15.10.nosrc.rpm
          bd99426598c23c5cf4952ed9c0b9cfe5
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-xen-2.6.13-15.10.nosrc.rpm
          27a2fce49d08338273edf412347450e0

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/Intel-536ep-4.69-10.6.src.rpm
          7a595d7e743780b65db104598cfdb2ca
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-bigsmp-2.6.11.4-21.12.nosrc.rpm
          aba93f8bf280e9b9508b862e2acd8c26
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-default-2.6.11.4-21.12.nosrc.rpm
          2690cdea0a1451ddf39244af68a32f01
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-docs-2.6.11.4-21.12.src.rpm
          375c09c4d956c9a90eb1832fe1b0e7ba
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-smp-2.6.11.4-21.12.nosrc.rpm
          4e89c3f5123a494a22de9975aabdea64
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-source-2.6.11.4-21.12.src.rpm
          829bcfd76fb4bca1a3c6ff4be1c87791
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-syms-2.6.11.4-21.12.src.rpm
          efbc9e5109781d675df5f24ddae4817d
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-um-2.6.11.4-21.12.nosrc.rpm
          b23f55072c9d48bc141be9112335ea2f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-xen-2.6.11.4-21.12.nosrc.rpm
          0e7d187812622e4a394e82acb36a137e
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/ltmodem-8.31a10-7.6.src.rpm
          adbabf2df36f8f6e31bf7fee3a0e3b19
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/um-host-install-initrd-1.0-50.6.src.rpm
          b30f1abc6f5f589bb96fcfa55b766a23

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/Intel-536ep-4.69-5.14.src.rpm
          2045cdb339052222eb43897c7f6ec68d
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-bigsmp-2.6.8-24.21.nosrc.rpm
          f57c0c7bfbd3ddb7934d3521e3ad2971
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-default-2.6.8-24.21.nosrc.rpm
          ad5227e1256c47049b1940cd247bf342
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-docs-2.6.8-24.21.src.rpm
          835713dab6b9996a0b504442c5c548fb
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-smp-2.6.8-24.21.nosrc.rpm
          5e5d999ec4074533ff8a334f0ceba606
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-source-2.6.8-24.21.src.rpm
          5ad0caa2141232a2b6e853ca00c0a542
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-syms-2.6.8-24.21.src.rpm
          178da4abc15ce40ef4672f3f90b7b4ff
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-um-2.6.8-24.21.nosrc.rpm
          a0f46baf2261a7673ad603a31df8105a
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/ltmodem-8.31a8-6.14.src.rpm
          ccb95498165c64de312f15a854a2bd12
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/um-host-install-initrd-1.0-48.13.src.rpm
          5348434281762cd80dee0d2c6fbb48b8

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-bigsmp-2.6.5-7.257.nosrc.rpm
          2a46b881826169a01adea054ae6910b9
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-default-2.6.5-7.257.nosrc.rpm
          fc59f9c8abb4f3fd81bfa6c2a7e875ad
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-docs-2.6.5-7.257.src.rpm
          3a5014aed0d55e97b5bcdc5545b1845c
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-smp-2.6.5-7.257.nosrc.rpm
          3d9ac7612fa3bb40a7f72bcffd5c8900
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-source-2.6.5-7.257.src.rpm
          1d9002c41679564c5b793f65d82cf15c
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-syms-2.6.5-7.257.src.rpm
          fb55f67a4cf66887f0046e6759ebc6ce
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/ltmodem-2.6.2-38.23.src.rpm
          415ace617e7d083988db2104744dc91f
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-default-2.6.5-7.257.nosrc.rpm
          3d6bd83f8ee9c778f391a6422fe227bb
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-docs-2.6.5-7.257.src.rpm
          a3a395f746078a8c521f7bd7dc8c45c0
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-smp-2.6.5-7.257.nosrc.rpm
          8eaa87737cc95dd9035f4bdcd87c8170
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-source-2.6.5-7.257.src.rpm
          a78615451a4cacc0e5c516b67490df17
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-syms-2.6.5-7.257.src.rpm
          5ca629212597b78e740f29ded4541abf

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

   SUSE SLES 9
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/1c4ff30ff5ed2a2d0d0586e03348032b.html

   SUSE CORE 9 for x86
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/e793251698757eb4bf71b0822baf6a5b.html

   SuSE Linux Enterprise Server 8 for IBM S/390 and IBM zSeries
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/308356dbd7f8c72f2c66dad286c511f9.html

   SUSE SLES 9 for AMD64 and Intel EM64T
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/a85a3e0133108b1cb77026293bc419dc.html

   SUSE SLES 9 for IBM zSeries 64bit
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/d315ac40f92dc38783162cde676a7b10.html

   SUSE CORE 9 for IBM S/390 31bit
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/c7910bbd0cc63477f583e6a6b35500ab.html

   SUSE SLES 9 for IBM POWER
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/55ecd36eedc87087ae2e28c961faef64.html

   SUSE CORE 9 for Itanium Processor Family
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/4a44452b6ec2076b441850a41a2711c4.html

   UnitedLinux 1.0
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/6d74d9ddf80228eba4bbce4c1f9e38dd.html
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/4839e281693768ffa93750f8bc54dcf1.html
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/7efe4a0df957d96db9ff8eec18a9e912.html

   SuSE Linux Enterprise Server 8 for IBM zSeries
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/a523f4d26f72bbbc2e3168eb07270400.html

   SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/946c2163106747c7a2bb7fce018ca5b6.html

   SuSE Linux Desktop 1.0
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/ec85d2e9f08af45ecd99f769df304314.html

______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify 

    replacing  with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made  using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team "

    where  is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig 

       to verify the signature of the package, replacing  with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum 

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    For general information or the frequently asked questions (FAQ),
    send mail to  or
    .

    =====================================================================
    SUSE's security contact is  or .
    The  public key is listed below.
    =====================================================================
______________________________________________________________________________

    The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way. In particular, the
    clear text signature should show proof of the authenticity of the text.

    SUSE Linux Products GmbH provides no warranties of any kind whatsoever
    with respect to the information contained in this security advisory.
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying
FreeBSD Patches DoS Vulnerability
Rogue cell towers discovered in Washington, D.C.
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.