U radu jezgre operacijskog sustava SUSE Linux Enterprise 11 ispravljeno je više sigurnosnih propusta. Lokalni napadač ih je mogao iskoristiti za DoS (eng. Denial of Service) napad te otkrivanje osjetljivih podataka.
Paket: | Linux kernel 2.6.x |
Operacijski sustavi: | SUSE Linux Enterprise Desktop 11, SUSE Linux Enterprise Server (SLES) 11 |
Kritičnost: | 5 |
Problem: | korupcija memorije, pogreška u programskoj komponenti |
Iskorištavanje: | lokalno |
Posljedica: | otkrivanje osjetljivih informacija, uskraćivanje usluga (DoS) |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2011-2928, CVE-2011-3191, CVE-2011-3353 |
Izvorni ID preporuke: | SUSE-SU-2011:1100-1 |
Izvor: | SUSE |
Problem: | |
Sigurnosne ranjivosti se javljaju zbog korupcije memorije u CIFS sustavu te pogrešaka u programskim funkcijama "fuse_copy_fill" i "befs_follow_link". |
|
Posljedica: | |
Lokalni zloćudni korisnik navedene ranjivosti može iskoristiti za otkrivanje podataka iz memorije te napad uskraćivanjem usluga (DoS). |
|
Rješenje: | |
Svim se korisnicima, u svrhu zaštite sigurnosti, savjetuje nadogradnja na novije inačice. |
Izvorni tekst preporuke
SUSE Security Update: Security update for Linux kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2011:1100-1
Rating: important
References: #588458 #603804 #632870 #642896 #649625 #650309
#667386 #669378 #688859 #694670 #699354 #699355
#699357 #701443 #701686 #704347 #706557 #707096
#707125 #707737 #708675 #708877 #709412 #711203
#711969 #712456 #712929 #713138 #713430 #714001
#714966 #715235 #715763 #716901 #719117 #719450
Cross-References: CVE-2011-2928 CVE-2011-3191 CVE-2011-3353
Affected Products:
SUSE Linux Enterprise Server 11 SP1 for VMware
SUSE Linux Enterprise Server 11 SP1
SUSE Linux Enterprise High Availability Extension 11 SP1
SUSE Linux Enterprise Desktop 11 SP1
______________________________________________________________________________
An update that solves three vulnerabilities and has 33
fixes is now available. It includes one version update.
Description:
The SUSE Linux Enterprise 11 Service Pack 1 kernel was
updated to 2.6.32.46 and fixes various bugs and security
issues.
Following security issues were fixed: CVE-2011-3191: A
signedness issue in CIFS could possibly have lead to to
memory corruption, if a malicious server could send
crafted replies to the host.
CVE-2011-3353: In the fuse filesystem,
FUSE_NOTIFY_INVAL_ENTRY did not check the length of the
write so the message processing could overrun and result
in a BUG_ON() in fuse_copy_fill(). This flaw could be used
by local users able to mount FUSE filesystems to crash the
system.
CVE-2011-2928: The befs_follow_link function in
fs/befs/linuxvfs.c in the Linux kernel did not validate
the length attribute of long symlinks, which allowed local
users to cause a denial of service (incorrect pointer
dereference and OOPS) by accessing a long symlink on a
malformed Be filesystem.
Also the following non security bugs were fixed: -
CONFIG_CGROUP_MEM_RES_CTLR_SWAP enabled -
CONFIG_CGROUP_MEM_RES_CTLR_SWAP_ENABLED disabled by
default. Swap accounting can be turned on by swapaccount=1
kernel command line parameter (bnc#719450) - Make swap
accounting default behavior configurable (bnc#719450,
bnc#650309, fate#310471).
*
Added a missing reset for ioc_reset_in_progress in
SoftReset in the mtpsas driver (bnc#711969).
*
Add support for the Digi/IBM PCIe 2-port Adapter
(bnc#708675).
*
Always enable MSI-X on 5709 (bnc#707737).
*
sched: fix broken SCHED_RESET_ON_FORK handling
(bnc#708877).
*
sched: Fix rt_rq runtime leakage bug (bnc#707096).
*
ACPI: allow passing down C1 information if no other
C-states exist.
*
KDB: turn off kdb usb support by default (bnc#694670
bnc#603804).
*
xfs: Added event tracing support.
*
xfs: fix xfs_fsblock_t tracing.
*
igb: extend maximum frame size to receive VLAN tagged
frames (bnc#688859).
*
cfq: Do not allow queue merges for queues that have
no process references (bnc#712929).
* cfq: break apart merged cfqqs if they stop
cooperating (bnc#712929).
* cfq: calculate the seek_mean per cfq_queue not per
cfq_io_context (bnc#712929).
* cfq: change the meaning of the cfqq_coop flag
(bnc#712929).
* cfq-iosched: get rid of the coop_preempt flag
(bnc#712929).
*
cfq: merge cooperating cfq_queues (bnc#712929).
*
Fix FDDI and TR config checks in ipv4 arp and LLC
(bnc#715235).
*
writeback: do uninterruptible sleep in
balance_dirty_pages() (bnc#699354 bnc#699357).
* xfs: fix memory reclaim recursion deadlock on locked
inode buffer (bnc#699355 bnc#699354).
*
xfs: use GFP_NOFS for page cache allocation
(bnc#699355 bnc#699354).
*
virtio-net: init link state correctly (bnc#714966).
*
cpufreq: pcc-cpufreq: sanity check to prevent a NULL
pointer dereference (bnc#709412).
*
x86: ucode-amd: Do not warn when no ucode is
available for a CPU
*
patches.arch/x86_64-unwind-annotations: Refresh
(bnc#588458).
*
patches.suse/stack-unwind: Refresh (bnc#588458).
*
splice: direct_splice_actor() should not use pos in
sd (bnc#715763).
*
qdio: 2nd stage retry on SIGA-W busy conditions
(bnc#713138,LTC#74402).
*
TTY: pty, fix pty counting (bnc#711203).
*
Avoid deadlock in GFP_IO/GFP_FS allocation
(bnc#632870).
*
novfs: fix some DirCache locking issues (bnc#669378).
* novfs: fix some kmalloc/kfree issues (bnc#669378).
* novfs: fix off-by-one allocation error (bnc#669378).
* novfs: unlink directory after unmap (bnc#649625).
*
novfs: last modification time not reliable
(bnc#642896).
*
x86 / IO APIC: Reset IRR in clear_IO_APIC_pin()
(bnc#701686, bnc#667386).
*
mptfusion : Added check for SILI bit in READ_6 CDB
for DATA UNDERRUN ERRATA (bnc #712456).
*
xfs: serialise unaligned direct IOs (bnc#707125).
*
NFS: Ensure that we handle NFS4ERR_STALE_STATEID
correctly (bnc#701443).
* NFSv4: Do not call nfs4_state_mark_reclaim_reboot()
from error handlers (bnc#701443).
* NFSv4: Fix open recovery (bnc#701443).
* NFSv4.1: Do not call nfs4_schedule_state_recovery()
unnecessarily (bnc#701443).
Security Issues:
* CVE-2011-3191
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3191
>
* CVE-2011-3353
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3353
>
* CVE-2011-2928
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2928
>
Indications:
Everyone using the Linux Kernel on x86_64 architecture should update.
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP1 for VMware:
zypper in -t patch slessp1-kernel-5219 slessp1-kernel-5223
- SUSE Linux Enterprise Server 11 SP1:
zypper in -t patch slessp1-kernel-5219 slessp1-kernel-5220
slessp1-kernel-5221 slessp1-kernel-5222 slessp1-kernel-5223
- SUSE Linux Enterprise High Availability Extension 11 SP1:
zypper in -t patch sleshasp1-kernel-5219 sleshasp1-kernel-5220
sleshasp1-kernel-5221 sleshasp1-kernel-5222 sleshasp1-kernel-5223
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-kernel-5219 sledsp1-kernel-5223
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version:
2.6.32.46]:
btrfs-kmp-default-0_2.6.32.46_0.3-0.3.57
ext4dev-kmp-default-0_2.6.32.46_0.3-7.9.24
hyper-v-kmp-default-0_2.6.32.46_0.3-0.14.11
kernel-default-2.6.32.46-0.3.1
kernel-default-base-2.6.32.46-0.3.1
kernel-default-devel-2.6.32.46-0.3.1
kernel-source-2.6.32.46-0.3.1
kernel-syms-2.6.32.46-0.3.1
kernel-trace-2.6.32.46-0.3.1
kernel-trace-base-2.6.32.46-0.3.1
kernel-trace-devel-2.6.32.46-0.3.1
- SUSE Linux Enterprise Server 11 SP1 for VMware (i586) [New Version:
2.6.32.46]:
btrfs-kmp-pae-0_2.6.32.46_0.3-0.3.57
ext4dev-kmp-pae-0_2.6.32.46_0.3-7.9.24
hyper-v-kmp-pae-0_2.6.32.46_0.3-0.14.11
kernel-pae-2.6.32.46-0.3.1
kernel-pae-base-2.6.32.46-0.3.1
kernel-pae-devel-2.6.32.46-0.3.1
- SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New
Version: 2.6.32.46]:
btrfs-kmp-default-0_2.6.32.46_0.3-0.3.57
ext4dev-kmp-default-0_2.6.32.46_0.3-7.9.24
kernel-default-2.6.32.46-0.3.1
kernel-default-base-2.6.32.46-0.3.1
kernel-default-devel-2.6.32.46-0.3.1
kernel-source-2.6.32.46-0.3.1
kernel-syms-2.6.32.46-0.3.1
kernel-trace-2.6.32.46-0.3.1
kernel-trace-base-2.6.32.46-0.3.1
kernel-trace-devel-2.6.32.46-0.3.1
- SUSE Linux Enterprise Server 11 SP1 (i586 x86_64) [New Version:
2.6.32.46]:
btrfs-kmp-xen-0_2.6.32.46_0.3-0.3.57
ext4dev-kmp-xen-0_2.6.32.46_0.3-7.9.24
hyper-v-kmp-default-0_2.6.32.46_0.3-0.14.11
kernel-ec2-2.6.32.46-0.3.1
kernel-ec2-base-2.6.32.46-0.3.1
kernel-xen-2.6.32.46-0.3.1
kernel-xen-base-2.6.32.46-0.3.1
kernel-xen-devel-2.6.32.46-0.3.1
- SUSE Linux Enterprise Server 11 SP1 (s390x) [New Version: 2.6.32.46]:
kernel-default-man-2.6.32.46-0.3.1
- SUSE Linux Enterprise Server 11 SP1 (ppc64) [New Version: 2.6.32.46]:
ext4dev-kmp-ppc64-0_2.6.32.46_0.3-7.9.24
kernel-ppc64-2.6.32.46-0.3.1
kernel-ppc64-base-2.6.32.46-0.3.1
kernel-ppc64-devel-2.6.32.46-0.3.1
- SUSE Linux Enterprise Server 11 SP1 (i586) [New Version: 2.6.32.46]:
btrfs-kmp-pae-0_2.6.32.46_0.3-0.3.57
ext4dev-kmp-pae-0_2.6.32.46_0.3-7.9.24
hyper-v-kmp-pae-0_2.6.32.46_0.3-0.14.11
kernel-pae-2.6.32.46-0.3.1
kernel-pae-base-2.6.32.46-0.3.1
kernel-pae-devel-2.6.32.46-0.3.1
- SUSE Linux Enterprise High Availability Extension 11 SP1 (i586 ia64 ppc64
s390x x86_64):
cluster-network-kmp-default-1.4_2.6.32.46_0.3-2.5.9
gfs2-kmp-default-2_2.6.32.46_0.3-0.2.56
ocfs2-kmp-default-1.6_2.6.32.46_0.3-0.4.2.9
- SUSE Linux Enterprise High Availability Extension 11 SP1 (i586 x86_64):
cluster-network-kmp-xen-1.4_2.6.32.46_0.3-2.5.9
gfs2-kmp-xen-2_2.6.32.46_0.3-0.2.56
ocfs2-kmp-xen-1.6_2.6.32.46_0.3-0.4.2.9
- SUSE Linux Enterprise High Availability Extension 11 SP1 (ppc64):
cluster-network-kmp-ppc64-1.4_2.6.32.46_0.3-2.5.9
gfs2-kmp-ppc64-2_2.6.32.46_0.3-0.2.56
ocfs2-kmp-ppc64-1.6_2.6.32.46_0.3-0.4.2.9
- SUSE Linux Enterprise High Availability Extension 11 SP1 (i586):
cluster-network-kmp-pae-1.4_2.6.32.46_0.3-2.5.9
gfs2-kmp-pae-2_2.6.32.46_0.3-0.2.56
ocfs2-kmp-pae-1.6_2.6.32.46_0.3-0.4.2.9
- SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version:
2.6.32.46]:
btrfs-kmp-default-0_2.6.32.46_0.3-0.3.57
btrfs-kmp-xen-0_2.6.32.46_0.3-0.3.57
hyper-v-kmp-default-0_2.6.32.46_0.3-0.14.11
kernel-default-2.6.32.46-0.3.1
kernel-default-base-2.6.32.46-0.3.1
kernel-default-devel-2.6.32.46-0.3.1
kernel-default-extra-2.6.32.46-0.3.1
kernel-desktop-devel-2.6.32.46-0.3.1
kernel-source-2.6.32.46-0.3.1
kernel-syms-2.6.32.46-0.3.1
kernel-xen-2.6.32.46-0.3.1
kernel-xen-base-2.6.32.46-0.3.1
kernel-xen-devel-2.6.32.46-0.3.1
kernel-xen-extra-2.6.32.46-0.3.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586) [New Version: 2.6.32.46]:
btrfs-kmp-pae-0_2.6.32.46_0.3-0.3.57
hyper-v-kmp-pae-0_2.6.32.46_0.3-0.14.11
kernel-pae-2.6.32.46-0.3.1
kernel-pae-base-2.6.32.46-0.3.1
kernel-pae-devel-2.6.32.46-0.3.1
kernel-pae-extra-2.6.32.46-0.3.1
References:
http://support.novell.com/security/cve/CVE-2011-2928.html
http://support.novell.com/security/cve/CVE-2011-3191.html
http://support.novell.com/security/cve/CVE-2011-3353.html
https://bugzilla.novell.com/588458
https://bugzilla.novell.com/603804
https://bugzilla.novell.com/632870
https://bugzilla.novell.com/642896
https://bugzilla.novell.com/649625
https://bugzilla.novell.com/650309
https://bugzilla.novell.com/667386
https://bugzilla.novell.com/669378
https://bugzilla.novell.com/688859
https://bugzilla.novell.com/694670
https://bugzilla.novell.com/699354
https://bugzilla.novell.com/699355
https://bugzilla.novell.com/699357
https://bugzilla.novell.com/701443
https://bugzilla.novell.com/701686
https://bugzilla.novell.com/704347
https://bugzilla.novell.com/706557
https://bugzilla.novell.com/707096
https://bugzilla.novell.com/707125
https://bugzilla.novell.com/707737
https://bugzilla.novell.com/708675
https://bugzilla.novell.com/708877
https://bugzilla.novell.com/709412
https://bugzilla.novell.com/711203
https://bugzilla.novell.com/711969
https://bugzilla.novell.com/712456
https://bugzilla.novell.com/712929
https://bugzilla.novell.com/713138
https://bugzilla.novell.com/713430
https://bugzilla.novell.com/714001
https://bugzilla.novell.com/714966
https://bugzilla.novell.com/715235
https://bugzilla.novell.com/715763
https://bugzilla.novell.com/716901
https://bugzilla.novell.com/719117
https://bugzilla.novell.com/719450
http://download.novell.com/patch/finder/?keywords=20cb09e23614f5f5085f698cc5bf2e4f
http://download.novell.com/patch/finder/?keywords=56d0712d83970cf6fe7492bf3330ee2a
http://download.novell.com/patch/finder/?keywords=94fa14c210d027059a56ea1e31e280c7
http://download.novell.com/patch/finder/?keywords=959314df0926c9887f7057c56f1d07c1
http://download.novell.com/patch/finder/?keywords=9a7f6196af0af6d69bc4d0f12e07e44d
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke