This kernel update for the SUSE Linux Enterprise 10 SP3
kernel fixes several security issues and bugs.
Following security issues were fixed:
CVE-2011-1593: Multiple integer overflows in the
next_pidmap function in kernel/pid.c in the Linux kernel
allowed local users to cause a denial of service (system
crash) via a crafted (1) getdents or (2) readdir system
call.
CVE-2009-4536: Only half of the fix for this
vulnerability was only applied, the fix was completed now.
Original text: drivers/net/e1000/e1000_main.c in the e1000
driver in the Linux kernel handled Ethernet frames that
exceed the MTU by processing certain trailing payload data
as if it were a complete frame, which allows remote
attackers to bypass packet filters via a large packet with
a crafted payload.
CVE-2011-1573: Boundschecking was missing in
AARESOLVE_OFFSET in the SCTP protocol, which allowed local
attackers to overwrite kernel memory and so escalate
privileges or crash the kernel.
CVE-2011-1017: Heap-based buffer overflow in the
ldm_frag_add function in fs/partitions/ldm.c in the Linux
kernel might have allowed local users to gain privileges or
obtain sensitive information via a crafted LDM partition
table.
CVE-2011-1585: When using a setuid root mount.cifs,
local users could hijack password protected mounted CIFS
shares of other local users.
CVE-2011-1160: Kernel information via the TPM devices
could by used by local attackers to read kernel memory.
CVE-2011-1577: The Linux kernel automatically
evaluated partition tables of storage devices. The code for
evaluating EFI GUID partitions (in fs/partitions/efi.c)
contained a bug that causes a kernel oops on certain
corrupted GUID partition tables, which might be used by
local attackers to crash the kernel or potentially execute
code.
CVE-2011-1180: In the IrDA module, length fields
provided by a peer for names and attributes may be longer
than the destination array sizes and were not checked, this
allowed local attackers (close to the irda port) to
potentially corrupt memory.
CVE-2010-4251: A system out of memory condition
(denial of service) could be triggered with a large socket
backlog, exploitable by local users. This has been
addressed by backlog limiting.
CVE-2011-1016: The Radeon GPU drivers in the Linux
kernel did not properly validate data related to the AA
resolve registers, which allowed local users to write to
arbitrary memory locations associated with (1) Video RAM
(aka VRAM) or (2) the Graphics Translation Table (GTT) via
crafted values.
CVE-2011-1493: When parsing the FAC_NATIONAL_DIGIS
facilities field, it was possible for a remote host to
provide more digipeaters than expected, resulting in heap
corruption.
CVE-2011-1182: Local attackers could send signals to
their programs that looked like coming from the kernel,
potentially gaining privileges in the context of setuid
programs.
CVE-2011-1017,CVE-2011-1012: The code for evaluating
LDM partitions (in fs/partitions/ldm.c) contained bugs that
could crash the kernel for certain corrupted LDM partitions.
CVE-2011-1010: The code for evaluating Mac partitions
(in fs/partitions/mac.c) contained a bug that could crash
the kernel for certain corrupted Mac partitions.
CVE-2011-1163: The code for evaluating OSF partitions
(in fs/partitions/osf.c) contained a bug that leaks data
from kernel heap memory to userspace for certain corrupted
OSF partitions.
CVE-2011-1476: Specially crafted requests may be
written to /dev/sequencer resulting in an underflow when
calculating a size for a copy_from_user() operation in the
driver for MIDI interfaces. On x86, this just returns an
error, but it could have caused memory corruption on other
architectures. Other malformed requests could have resulted
in the use of uninitialized variables.
CVE-2011-1477: Due to a failure to validate
user-supplied indexes in the driver for Yamaha YM3812 and
OPL-3 chips, a specially crafted ioctl request could have
been sent to /dev/sequencer, resulting in reading and
writing beyond the bounds of heap buffers, and potentially
allowing privilege escalation.
CVE-2011-0191: A information leak in the XFS geometry
calls could be used by local attackers to gain access to
kernel information.
CVE-2010-0008: The sctp_rcv_ootb function in the SCTP
implementation in the Linux kernel allowed remote attackers
to cause a denial of service (infinite loop) via (1) an Out
Of The Blue (OOTB) chunk or (2) a chunk of zero length.
download.novell.com/patch/finder/?keywords=0385d2ed073fc66a850ce73c16c29d29
download.novell.com/patch/finder/?keywords=2156573c3a8ca54a9f3a12aaa5e94fdc
download.novell.com/patch/finder/?keywords=2d2b831a90188575c5f6f48a7145b588
download.novell.com/patch/finder/?keywords=5fd532ca4daf2599f9c443a8dc010ade
download.novell.com/patch/finder/?keywords=e730666526d444d4f3bd71e10988453d
bugzilla.novell.com/542282
bugzilla.novell.com/567376
bugzilla.novell.com/586195
bugzilla.novell.com/644541
bugzilla.novell.com/655973
bugzilla.novell.com/656293
bugzilla.novell.com/657017
bugzilla.novell.com/657029
bugzilla.novell.com/664725
bugzilla.novell.com/668483
bugzilla.novell.com/670275
bugzilla.novell.com/672453
bugzilla.novell.com/672505
bugzilla.novell.com/673929
bugzilla.novell.com/673934
bugzilla.novell.com/674254
bugzilla.novell.com/674648
bugzilla.novell.com/674693
bugzilla.novell.com/677286
bugzilla.novell.com/678356
bugzilla.novell.com/679812
bugzilla.novell.com/680040
bugzilla.novell.com/680844
bugzilla.novell.com/681175
bugzilla.novell.com/681497
bugzilla.novell.com/681826
bugzilla.novell.com/681999
bugzilla.novell.com/682251
bugzilla.novell.com/683101
bugzilla.novell.com/683282
bugzilla.novell.com/685402
bugzilla.novell.com/686813
bugzilla.novell.com/686901
bugzilla.novell.com/687113
bugzilla.novell.com/688432
bugzilla.novell.com/688967
bugzilla.novell.com/692601
bugzilla.novell.com/693149
bugzilla.novell.com/693796