The openSUSE 11.4 kernel was updated to fix bugs and
security issues.
Following security issues have been fixed: CVE-2011-4604:
If root does read() on a specific socket, it’s possible to
corrupt (kernel) memory over network, with an ICMP packet,
if the B.A.T.M.A.N. mesh protocol is used.
CVE-2011-2699: Fernando Gont discovered that the IPv6 stack
used predictable fragment identification numbers. A remote
attacker could exploit this to exhaust network resources,
leading to a denial of service.
CVE-2011-1173: A kernel information leak via ip6_tables was
fixed.
CVE-2011-1172: A kernel information leak via ip6_tables
netfilter was fixed.
CVE-2011-1171: A kernel information leak via ip_tables was
fixed.
CVE-2011-1170: A kernel information leak via arp_tables was
fixed.
CVE-2011-1080: A kernel information leak via netfilter was
fixed.
CVE-2011-2213: The inet_diag_bc_audit function in
net/ipv4/inet_diag.c in the Linux kernel did not properly
audit INET_DIAG bytecode, which allowed local users to
cause a denial of service (kernel infinite loop) via
crafted INET_DIAG_REQ_BYTECODE instructions in a netlink
message, as demonstrated by an INET_DIAG_BC_JMP instruction
with a zero yes value, a different vulnerability than
CVE-2010-3880.
CVE-2011-2534: Buffer overflow in the clusterip_proc_write
function in net/ipv4/netfilter/ipt_CLUSTERIP.c in the Linux
kernel might have allowed local users to cause a denial of
service or have unspecified other impact via a crafted
write operation, related to string data that lacks a
terminating ‘\0’ character.
CVE-2011-1770: Integer underflow in the dccp_parse_options
function (net/dccp/options.c) in the Linux kernel allowed
remote attackers to cause a denial of service via a
Datagram Congestion Control Protocol (DCCP) packet with an
invalid feature options length, which triggered a buffer
over-read.
CVE-2011-2723: The skb_gro_header_slow function in
include/linux/netdevice.h in the Linux kernel, when Generic
Receive Offload (GRO) is enabled, reset certain fields in
incorrect situations, which allowed remote attackers to
cause a denial of service (system crash) via crafted
network traffic.
CVE-2011-2898: A kernel information leak in the AF_PACKET
protocol was fixed which might have allowed local attackers
to read kernel memory.
CVE-2011-4087: A local denial of service when using bridged
networking via a flood ping was fixed.
CVE-2011-2203: A NULL ptr dereference on mounting corrupt
hfs filesystems was fixed which could be used by local
attackers to crash the kernel.
CVE-2011-4081: Using the crypto interface a local user
could Oops the kernel by writing to a AF_ALG socket.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE | 11.4 | x86_64 | kernel-ec2 | < 2.6.37.6-0.11.1 | kernel-ec2-2.6.37.6-0.11.1.x86_64.rpm |
openSUSE | 11.4 | noarch | kernel-devel | < 2.6.37.6-0.11.1 | kernel-devel-2.6.37.6-0.11.1.noarch.rpm |
openSUSE | 11.4 | x86_64 | kernel-vanilla-base | < 2.6.37.6-0.11.1 | kernel-vanilla-base-2.6.37.6-0.11.1.x86_64.rpm |
openSUSE | 11.4 | i586 | kernel-desktop-devel | < 2.6.37.6-0.11.1 | kernel-desktop-devel-2.6.37.6-0.11.1.i586.rpm |
openSUSE | 11.4 | i586 | kernel-vmi | < 2.6.37.6-0.11.1 | kernel-vmi-2.6.37.6-0.11.1.i586.rpm |
openSUSE | 11.4 | x86_64 | kernel-vanilla-devel | < 2.6.37.6-0.11.1 | kernel-vanilla-devel-2.6.37.6-0.11.1.x86_64.rpm |
openSUSE | 11.4 | i586 | kernel-trace | < 2.6.37.6-0.11.1 | kernel-trace-2.6.37.6-0.11.1.i586.rpm |
openSUSE | 11.4 | i586 | kernel-vanilla-devel | < 2.6.37.6-0.11.1 | kernel-vanilla-devel-2.6.37.6-0.11.1.i586.rpm |
openSUSE | 11.4 | x86_64 | kernel-default | < 2.6.37.6-0.11.1 | kernel-default-2.6.37.6-0.11.1.x86_64.rpm |
openSUSE | 11.4 | x86_64 | kernel-ec2-base | < 2.6.37.6-0.11.1 | kernel-ec2-base-2.6.37.6-0.11.1.x86_64.rpm |
bugzilla.novell.com/676602
bugzilla.novell.com/679059
bugzilla.novell.com/681180
bugzilla.novell.com/681181
bugzilla.novell.com/681184
bugzilla.novell.com/681185
bugzilla.novell.com/691052
bugzilla.novell.com/692498
bugzilla.novell.com/699709
bugzilla.novell.com/700879
bugzilla.novell.com/702037
bugzilla.novell.com/707288
bugzilla.novell.com/709561
bugzilla.novell.com/709764
bugzilla.novell.com/710235
bugzilla.novell.com/713933
bugzilla.novell.com/723999
bugzilla.novell.com/726788
bugzilla.novell.com/736149