Lucene search

K
suseSuseSUSE-SU-2011:0711-1
HistoryJun 29, 2011 - 7:08 p.m.

Security update for Linux kernel (important)

2011-06-2919:08:19
lists.opensuse.org
25

0.144 Low

EPSS

Percentile

95.2%

This kernel update for the SUSE Linux Enterprise 10 SP3
kernel fixes several security issues and bugs.

Following security issues were fixed:

CVE-2011-1593: Multiple integer overflows in the
next_pidmap function in kernel/pid.c in the Linux kernel
allowed local users to cause a denial of service (system
crash) via a crafted (1) getdents or (2) readdir system
call.

CVE-2009-4536: Only half of the fix for this
vulnerability was only applied, the fix was completed now.
Original text: drivers/net/e1000/e1000_main.c in the e1000
driver in the Linux kernel handled Ethernet frames that
exceed the MTU by processing certain trailing payload data
as if it were a complete frame, which allows remote
attackers to bypass packet filters via a large packet with
a crafted payload.

CVE-2011-1573: Boundschecking was missing in
AARESOLVE_OFFSET in the SCTP protocol, which allowed local
attackers to overwrite kernel memory and so escalate
privileges or crash the kernel.

CVE-2011-1017: Heap-based buffer overflow in the
ldm_frag_add function in fs/partitions/ldm.c in the Linux
kernel might have allowed local users to gain privileges or
obtain sensitive information via a crafted LDM partition
table.

CVE-2011-1585: When using a setuid root mount.cifs,
local users could hijack password protected mounted CIFS
shares of other local users.

CVE-2011-1160: Kernel information via the TPM devices
could by used by local attackers to read kernel memory.

CVE-2011-1577: The Linux kernel automatically
evaluated partition tables of storage devices. The code for
evaluating EFI GUID partitions (in fs/partitions/efi.c)
contained a bug that causes a kernel oops on certain
corrupted GUID partition tables, which might be used by
local attackers to crash the kernel or potentially execute
code.

CVE-2011-1180: In the IrDA module, length fields
provided by a peer for names and attributes may be longer
than the destination array sizes and were not checked, this
allowed local attackers (close to the irda port) to
potentially corrupt memory.

CVE-2010-4251: A system out of memory condition
(denial of service) could be triggered with a large socket
backlog, exploitable by local users. This has been
addressed by backlog limiting.

CVE-2011-1016: The Radeon GPU drivers in the Linux
kernel did not properly validate data related to the AA
resolve registers, which allowed local users to write to
arbitrary memory locations associated with (1) Video RAM
(aka VRAM) or (2) the Graphics Translation Table (GTT) via
crafted values.

CVE-2011-1493: When parsing the FAC_NATIONAL_DIGIS
facilities field, it was possible for a remote host to
provide more digipeaters than expected, resulting in heap
corruption.

CVE-2011-1182: Local attackers could send signals to
their programs that looked like coming from the kernel,
potentially gaining privileges in the context of setuid
programs.

CVE-2011-1017,CVE-2011-1012: The code for evaluating
LDM partitions (in fs/partitions/ldm.c) contained bugs that
could crash the kernel for certain corrupted LDM partitions.

CVE-2011-1010: The code for evaluating Mac partitions
(in fs/partitions/mac.c) contained a bug that could crash
the kernel for certain corrupted Mac partitions.

CVE-2011-1163: The code for evaluating OSF partitions
(in fs/partitions/osf.c) contained a bug that leaks data
from kernel heap memory to userspace for certain corrupted
OSF partitions.

CVE-2011-1476: Specially crafted requests may be
written to /dev/sequencer resulting in an underflow when
calculating a size for a copy_from_user() operation in the
driver for MIDI interfaces. On x86, this just returns an
error, but it could have caused memory corruption on other
architectures. Other malformed requests could have resulted
in the use of uninitialized variables.

CVE-2011-1477: Due to a failure to validate
user-supplied indexes in the driver for Yamaha YM3812 and
OPL-3 chips, a specially crafted ioctl request could have
been sent to /dev/sequencer, resulting in reading and
writing beyond the bounds of heap buffers, and potentially
allowing privilege escalation.

CVE-2011-0191: A information leak in the XFS geometry
calls could be used by local attackers to gain access to
kernel information.

CVE-2010-0008: The sctp_rcv_ootb function in the SCTP
implementation in the Linux kernel allowed remote attackers
to cause a denial of service (infinite loop) via (1) an Out
Of The Blue (OOTB) chunk or (2) a chunk of zero length.

References