A security announcement from SUSE
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: kernel
Announcement ID: SUSE-SA:2006:028
Date: Wed, 31 May 2006 18:00:00 +0000
Affected Products: SUSE LINUX 10.0
SUSE LINUX 9.3
SUSE LINUX 9.2
SUSE LINUX 9.1
SuSE Linux Desktop 1.0
SuSE Linux Enterprise Server 8
SUSE SLES 9
UnitedLinux 1.0
Vulnerability Type: remote denial of service
Severity (1-10): 7
SUSE Default Package: yes
Cross-References: CVE-2005-4798, CVE-2006-0095, CVE-2006-0457
CVE-2006-0554, CVE-2006-0555, CVE-2006-0557
CVE-2006-0741, CVE-2006-0742, CVE-2006-0744
CVE-2006-1055, CVE-2006-1056, CVE-2006-1242
CVE-2006-1342, CVE-2006-1523, CVE-2006-1524
CVE-2006-1525, CVE-2006-1527, CVE-2006-1863
CVE-2006-1864, CVE-2006-2271, CVE-2006-2272
CVE-2006-2274
Content of This Advisory:
1) Security Vulnerability Resolved:
various kernel security problems
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
The Linux kernel has been updated to fix various security problems,
listed below.
Note that some of the updates have already been released end of last
week.
- AppArmor in SUSE Linux 10.0 and SUSE Linux Enterprise Server 9 SP3
could crash the machine by an negative dentry reference due to
for instance vanishing path component during a system call of a
profiled application.
- AppArmor in SUSE Linux 10.0 and SUSE Linux Enterprise Server 9 SP3
failed to prevent PTRACE_ME on a confined parent, allowing an
infected called program to gain the same rights as its parent
process.
- CVE-2006-2274: Linux SCTP allows remote attackers to cause a
denial of service (infinite recursion and crash) via a packet that
contains two or more DATA fragments, which causes an skb pointer
to refer back to itself when the full message is reassembled,
leading to infinite recursion in the sctp_skb_pull function.
- CVE-2006-2272: Linux SCTP allowed remote attackers to cause a
denial of service (kernel panic) via incoming IP fragmented (1)
COOKIE_ECHO and (2) HEARTBEAT SCTP control chunks.
- CVE-2006-2271: The ECNE chunk handling in Linux SCTP allowed
remote attackers to cause a denial of service (kernel panic) via
an unexpected chunk when the session is in CLOSED state.
- CVE-2006-1864: Due to incorrect argument checking it was possible
to break out of chroots on smbfs file systems.
- CVE-2006-1863: Due to incorrect argument checking it was possible
to break out of chroots on cifs file systems.
- CVE-2006-1527: NETFILTER SCTP conntrack: Fixed an infinite loop
in sctp handling, which could be caused by a remote attacker.
- CVE-2006-1525: IPV4: Fixed a machine crash in ip_route_input that
could be triggered via the "route" command from local attackers.
- CVE-2006-1524: shmat: stop mprotect from giving write permission
to a read-only shared memory attachment.
- CVE-2006-1523: __group_complete_signal: Removed a bogus BUG_ON which
could lead to unwanted process crashes.
- CVE-2006-1342: A minor information leak in SO_ORIGINAL_DST was fixed.
- CVE-2006-1242: Fix IPv4 IPID generation to avoid possible idle scans
against the machine.
- CVE-2006-1056: i386/x86-64: Fix AMD x87 information leak between
processes.
- CVE-2006-1055: sysfs: Zero terminate sysfs write buffers.
- CVE-2006-0744: When the user could have changed %RIP always force IRET.
- CVE-2006-0742: IA64 only: Don't declare die_if_kernel as noreturn,
otherwise local attackers can crash the machine.
- CVE-2006-0741: x86_64 only: Always check that RIPs are canonical
during signal handling, otherwise local attackers could crash
the machine.
- CVE-2006-0557: Add an upper boundary to mempolicy node arguments
to avoid potentially local crashes.
- CVE-2006-0555: A normal user was able to panic the NFS client with
direct I/O.
- CVE-2006-0554: A XFS ftruncate() bug could expose stale data.
- CVE-2006-0457: A race condition in the add_key, request_key,
and keyctl functions allows local users to cause a denial of service
(crash) or read sensitive kernel memory by modifying the length of
a string argument between the time that the kernel calculates the
length and when it copies the data into kernel memory.
(Please Note that keyctls are not enabled in SUSE Linux up to 10.0).
- CVE-2006-0095: dm-crypt: Zero key before freeing it to avoid leakage.
- CVE-2005-4798: Creation of long symlinks on the NFS server could
crash the client machine.
Additionally some non security bug fixes include:
- Lots of bugfixes in the SUSE Linux Enterprise 9 and SUSE Linux
9.1 kernel.
- The S/390 tape driver is now opensource and the previous oco drivers
are no longer supported.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
SPECIAL INSTALLATION INSTRUCTIONS
=================================
The following paragraphs guide you through the installation
process in a step-by-step fashion. The character sequence "****"
marks the beginning of a new paragraph. In some cases, the steps
outlined in a particular paragraph may or may not be applicable
to your situation. Therefore, make sure that you read through
all of the steps below before attempting any of these
procedures. All of the commands that need to be executed must be
run as the superuser 'root'. Each step relies on the steps
before it to complete successfully.
**** Step 1: Determine the needed kernel type.
Use the following command to determine which kind of kernel is
installed on your system:
rpm -qf --qf '%{name}\n' /boot/vmlinuz
**** Step 2: Download the packages for your system.
Download the kernel RPM package for your distribution with the
name indicated by Step 1. Starting from SUSE LINUX 9.2, kernel
modules that are not free were moved to a separate package with
the suffix '-nongpl' in its name. Download that package as well
if you rely on hardware that requires non-free drivers, such as
some ISDN adapters. The list of all kernel RPM packages is
appended below.
The kernel-source package does not contain a binary kernel in
bootable form. Instead, it contains the sources that correspond
with the binary kernel RPM packages. This package is required to
build third party add-on modules.
**** Step 3: Verify authenticity of the packages.
Verify the authenticity of the kernel RPM package using the
methods as listed in Section 6 of this SUSE Security
Announcement.
**** Step 4: Installing your kernel rpm package.
Install the rpm package that you have downloaded in Step 2 with
the command
rpm -Uhv <FILE>
replacing <FILE> with the filename of the RPM package
downloaded.
Warning: After performing this step, your system may not boot
unless the following steps have been followed
completely.
**** Step 5: Configuring and creating the initrd.
The initrd is a RAM disk that is loaded into the memory of your
system together with the kernel boot image by the boot loader.
The kernel uses the content of this RAM disk to execute commands
that must be run before the kernel can mount its root file
system. The initrd is typically used to load hard disk
controller drivers and file system modules. The variable
INITRD_MODULES in /etc/sysconfig/kernel determines which kernel
modules are loaded in the initrd.
After a new kernel rpm has been installed, the initrd must be
recreated to include the updated kernel modules. Usually this
happens automatically when installing the kernel rpm. If
creating the initrd fails for some reason, manually run the
command
/sbin/mkinitrd
**** Step 6: Update the boot loader, if necessary.
Depending on your software configuration, you either have the
LILO or GRUB boot loader installed and initialized on your
system. Use the command
grep LOADER_TYPE /etc/sysconfig/bootloader
to find out which boot loader is configured.
The GRUB boot loader does not require any further action after a
new kernel has been installed. You may proceed to the next step
if you are using GRUB.
If you use the LILO boot loader, lilo must be run to
reinitialize the boot sector of the hard disk. Usually this
happens automatically when installing the kernel RPM. In case
this step fails, run the command
/sbin/lilo
Warning: An improperly installed boot loader will render your
system unbootable.
**** Step 7: Reboot.
If all of the steps above have been successfully completed on
your system, the new kernel including the kernel modules and the
initrd are ready to boot. The system needs to be rebooted for
the changes to be active. Make sure that all steps have been
completed then reboot using the command
/sbin/shutdown -r now
Your system will now shut down and restart with the new kernel.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv <file.rpm>
to apply the update, replacing <file.rpm> with the filename of the
downloaded RPM package.
x86 Platform:
SUSE LINUX 10.0:
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/Intel-536ep-4.69-14.5.i586.rpm
3a83b6b2ac93a33ccbef968f91ea1599
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-2.6.13-15.10.i586.rpm
82d114ebbb80523fcc9c772f15f5bf59
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-nongpl-2.6.13-15.10.i586.rpm
00b0c272a99a222cdaa8ed2932ed4e72
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-2.6.13-15.10.i586.rpm
9b6a9c3f4b6e848a22032d6aa60e01ed
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-nongpl-2.6.13-15.10.i586.rpm
cd834d6bfffe716eb0ba7f65835da3b3
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-2.6.13-15.10.i586.rpm
6b6a48bdd2acaae2a17006a3266ceb1d
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-nongpl-2.6.13-15.10.i586.rpm
08a960b9f08a18b70cf932ed49bce39c
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-source-2.6.13-15.10.i586.rpm
f5439ee02ca40c4fb123d15a43082390
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-syms-2.6.13-15.10.i586.rpm
50556d3b9f06e2a850f16cc37260ae02
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-2.6.13-15.10.i586.rpm
5546aa0f75ac02c60a98c8530182b125
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-nongpl-2.6.13-15.10.i586.rpm
4379e54d1bb5da4a0145f18e15a50ebe
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-2.6.13-15.10.i586.rpm
4a6b8022c5e785ab2da2be4a872baf52
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-nongpl-2.6.13-15.10.i586.rpm
5c0566baf35363ca22af29bd61bc6117
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/um-host-kernel-2.6.13-15.10.i586.rpm
15b889451fd0837cd117c9e4b7adf1ab
SUSE LINUX 9.3:
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/Intel-536ep-4.69-10.6.i586.rpm
2410d834eab16f1626457bb02b2a1a74
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-2.6.11.4-21.12.i586.rpm
92d05ecd1c3b69768129ec48f857003c
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-nongpl-2.6.11.4-21.12.i586.rpm
c7d85941249af8919e53fb114f64d9ab
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-2.6.11.4-21.12.i586.rpm
2ca07b757a0ecbdc2ae162fdbb74fe84
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-nongpl-2.6.11.4-21.12.i586.rpm
abe9aef7428dcae8d4cb6e10e9160250
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-2.6.11.4-21.12.i586.rpm
d2881e4ce268834485cc6109d0f053c3
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-nongpl-2.6.11.4-21.12.i586.rpm
48c6295b8f68d5c80a9f3fbeef1edcc3
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-source-2.6.11.4-21.12.i586.rpm
a564139b3c87831391474cb9c745ab52
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-syms-2.6.11.4-21.12.i586.rpm
fce134e65cf241b2c41051af535f9fa5
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-2.6.11.4-21.12.i586.rpm
174c52764d54f03a47406d0a01370e25
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-nongpl-2.6.11.4-21.12.i586.rpm
4e0495322a4b2f38da8265df47051c43
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-2.6.11.4-21.12.i586.rpm
072e3bf41cab06360bd87c30bfb0b15a
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-nongpl-2.6.11.4-21.12.i586.rpm
1a644cf0d30553f845c44767d009e8d2
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/ltmodem-8.31a10-7.6.i586.rpm
af5d6fdbcdcf67b15780cfabd6bde63d
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-install-initrd-1.0-50.6.i586.rpm
eb1ec5422e5dda9558fa8367ff042901
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-kernel-2.6.11.4-21.12.i586.rpm
5b7745b79e8bd19e42d68628889daa1a
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/Intel-536ep-4.69-5.14.i586.rpm
b117fe5ca34185091a50c7f2bf17b8c5
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-2.6.8-24.21.i586.rpm
e6fcd60b751a8811fe3264a5423dddf4
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-nongpl-2.6.8-24.21.i586.rpm
fe6b529d2ede5d43301db7a8ab12f9bf
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-2.6.8-24.21.i586.rpm
30f59434537cee4176b2511ed2875184
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-nongpl-2.6.8-24.21.i586.rpm
ef6a69c4982c498bf4f2855a75047f38
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-2.6.8-24.21.i586.rpm
a3f3ce1148b2f94997108da61ab640a8
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-nongpl-2.6.8-24.21.i586.rpm
56791a070623ab550e71a14ee329a412
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-source-2.6.8-24.21.i586.rpm
cead4b081e6a01e0848ec26f652c9b8a
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-syms-2.6.8-24.21.i586.rpm
c4e9b67ee0740d86e1565c3aaa4ac250
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-2.6.8-24.21.i586.rpm
854c60aea3df5d4671bf8d902d842214
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-nongpl-2.6.8-24.21.i586.rpm
e5e1fdcfb20887ca944be07e1ffd5835
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/ltmodem-8.31a8-6.14.i586.rpm
ffe2733bb885439897af61680dfa386d
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-install-initrd-1.0-48.13.i586.rpm
ddbb39bfa6ddec0079e57fb378465346
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-kernel-2.6.8-24.21.i586.rpm
f98c69a01d4a93d1e3f7eb4a0f81a481
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6.5-7.257.i586.rpm
d19076aa179801c307fd137ebe10900f
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2.6.5-7.257.i586.rpm
4a25e927ab95b0173cfafa394f91f207
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.5-7.257.i586.rpm
677290d102ac4b238f7c6dd12808f554
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-source-2.6.5-7.257.i586.rpm
fadc7d71a944ad5e1c3857cc0910cde1
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.5-7.257.i586.rpm
7aeeb6366b2528975004d21e17e1453e
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/ltmodem-2.6.2-38.23.i586.rpm
93611206083c3d867d7f8e697e0b9683
Platform Independent:
SUSE LINUX 9.3:
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/noarch/kernel-docs-2.6.11.4-21.12.noarch.rpm
c2c3264f47360840d988a878845e0280
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/noarch/kernel-docs-2.6.8-24.21.noarch.rpm
0c39c810d06835f4e4b4ba3b5283d5e3
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.257.noarch.rpm
e5c63b4d0d11b19d198b08646c2bfa89
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.257.noarch.rpm
ec17f895636cda948927ca6a37e5f990
Power PC Platform:
SUSE LINUX 10.0:
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-default-2.6.13-15.10.ppc.rpm
063b606929bec2b369675009b654c2b3
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-iseries64-2.6.13-15.10.ppc.rpm
ae9e7b8c030d846dbebd2185d6dc233d
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-ppc64-2.6.13-15.10.ppc.rpm
922320a95ab56d93147306c6f2a1a0b5
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-source-2.6.13-15.10.ppc.rpm
ff773fb617e428ad9cb8ccf9e8acccfb
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-syms-2.6.13-15.10.ppc.rpm
3853da634e2914f6952fbf7378ee050a
x86-64 Platform:
SUSE LINUX 10.0:
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-2.6.13-15.10.x86_64.rpm
f6743cde2b350ff70eb251c855515702
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-nongpl-2.6.13-15.10.x86_64.rpm
074b1a8d73ddad88067690c46bddddb4
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-2.6.13-15.10.x86_64.rpm
268b29a0654711992b9583e8528d175a
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-nongpl-2.6.13-15.10.x86_64.rpm
f6986f14c6f800b7794569b9543f4ffa
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-source-2.6.13-15.10.x86_64.rpm
696e7f31a7269890f44338b9c81e8614
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-syms-2.6.13-15.10.x86_64.rpm
d2a85c7eba759d921ceb760b670e24d4
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-2.6.13-15.10.x86_64.rpm
d1a572732edce8d2163b84d9eb2a6151
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-nongpl-2.6.13-15.10.x86_64.rpm
ebbadcab9a3b67e58e430a6819c8214d
SUSE LINUX 9.3:
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-2.6.11.4-21.12.x86_64.rpm
26fd19dd2b4b76545cb9a2d7d1206980
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-nongpl-2.6.11.4-21.12.x86_64.rpm
ff1adebf486711688f6d8ec25a2c8442
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-2.6.11.4-21.12.x86_64.rpm
c7b1d557bf3980023d4be44ffb51029b
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-nongpl-2.6.11.4-21.12.x86_64.rpm
66ca05be8638d26d85c5335d8b453770
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-source-2.6.11.4-21.12.x86_64.rpm
a4a01f6e186586ab97eb09cf81f8f71c
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-syms-2.6.11.4-21.12.x86_64.rpm
ba55d640082d2d2288e4e01f07f9f48e
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-2.6.8-24.21.x86_64.rpm
7598a1386bff406c10732459ad7daf3f
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-nongpl-2.6.8-24.21.x86_64.rpm
ee103b10429dbedf672e42a6d783d487
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-2.6.8-24.21.x86_64.rpm
b05fceea2901e5519b5c9e97f9a05422
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-nongpl-2.6.8-24.21.x86_64.rpm
f1da6bf6bb890f23ec43099beeb8fc33
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-source-2.6.8-24.21.x86_64.rpm
a35e63ed009211c0f56b45f2663e9f10
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-syms-2.6.8-24.21.x86_64.rpm
583513d1ae02adb0581331be8caca884
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-default-2.6.5-7.257.x86_64.rpm
52a626483d1c45c5083ba02cdce0ccdf
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2.6.5-7.257.x86_64.rpm
b4a1fdb2f84017168e646b2b36b46049
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-source-2.6.5-7.257.x86_64.rpm
7a095385c5f2a11e5c6f277d006d9b60
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2.6.5-7.257.x86_64.rpm
a7d92f0e5fe3a79803b43b8dc32b96be
Sources:
SUSE LINUX 10.0:
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/Intel-536ep-4.69-14.5.src.rpm
a7b4d8a829b820bf31b1b7ea8fb515a6
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-bigsmp-2.6.13-15.10.nosrc.rpm
b18631694f0c4a90f7998017a0686da0
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-default-2.6.13-15.10.nosrc.rpm
8d41d57e04f90958209039bc0e862152
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-iseries64-2.6.13-15.10.nosrc.rpm
97b6bc393384ea961075ecf3f101fb83
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-ppc64-2.6.13-15.10.nosrc.rpm
acdfc8e7aef4da43b4c527efe1df62f3
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-smp-2.6.13-15.10.nosrc.rpm
cbcfb3e48d275ed33597314608dd3737
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.10.nosrc.rpm
679f570d3af962b4ba92c69be0128f24
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.10.src.rpm
605aa540269d6c3bee3bee1b7b505301
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-syms-2.6.13-15.10.src.rpm
c01dd8279fa7899d8d21d84517aa4459
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-um-2.6.13-15.10.nosrc.rpm
bd99426598c23c5cf4952ed9c0b9cfe5
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-xen-2.6.13-15.10.nosrc.rpm
27a2fce49d08338273edf412347450e0
SUSE LINUX 9.3:
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/Intel-536ep-4.69-10.6.src.rpm
7a595d7e743780b65db104598cfdb2ca
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-bigsmp-2.6.11.4-21.12.nosrc.rpm
aba93f8bf280e9b9508b862e2acd8c26
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-default-2.6.11.4-21.12.nosrc.rpm
2690cdea0a1451ddf39244af68a32f01
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-docs-2.6.11.4-21.12.src.rpm
375c09c4d956c9a90eb1832fe1b0e7ba
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-smp-2.6.11.4-21.12.nosrc.rpm
4e89c3f5123a494a22de9975aabdea64
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-source-2.6.11.4-21.12.src.rpm
829bcfd76fb4bca1a3c6ff4be1c87791
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-syms-2.6.11.4-21.12.src.rpm
efbc9e5109781d675df5f24ddae4817d
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-um-2.6.11.4-21.12.nosrc.rpm
b23f55072c9d48bc141be9112335ea2f
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-xen-2.6.11.4-21.12.nosrc.rpm
0e7d187812622e4a394e82acb36a137e
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/ltmodem-8.31a10-7.6.src.rpm
adbabf2df36f8f6e31bf7fee3a0e3b19
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/um-host-install-initrd-1.0-50.6.src.rpm
b30f1abc6f5f589bb96fcfa55b766a23
SUSE LINUX 9.2:
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/Intel-536ep-4.69-5.14.src.rpm
2045cdb339052222eb43897c7f6ec68d
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-bigsmp-2.6.8-24.21.nosrc.rpm
f57c0c7bfbd3ddb7934d3521e3ad2971
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-default-2.6.8-24.21.nosrc.rpm
ad5227e1256c47049b1940cd247bf342
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-docs-2.6.8-24.21.src.rpm
835713dab6b9996a0b504442c5c548fb
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-smp-2.6.8-24.21.nosrc.rpm
5e5d999ec4074533ff8a334f0ceba606
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-source-2.6.8-24.21.src.rpm
5ad0caa2141232a2b6e853ca00c0a542
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-syms-2.6.8-24.21.src.rpm
178da4abc15ce40ef4672f3f90b7b4ff
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-um-2.6.8-24.21.nosrc.rpm
a0f46baf2261a7673ad603a31df8105a
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/ltmodem-8.31a8-6.14.src.rpm
ccb95498165c64de312f15a854a2bd12
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/um-host-install-initrd-1.0-48.13.src.rpm
5348434281762cd80dee0d2c6fbb48b8
SUSE LINUX 9.1:
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-bigsmp-2.6.5-7.257.nosrc.rpm
2a46b881826169a01adea054ae6910b9
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-default-2.6.5-7.257.nosrc.rpm
fc59f9c8abb4f3fd81bfa6c2a7e875ad
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-docs-2.6.5-7.257.src.rpm
3a5014aed0d55e97b5bcdc5545b1845c
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-smp-2.6.5-7.257.nosrc.rpm
3d9ac7612fa3bb40a7f72bcffd5c8900
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-source-2.6.5-7.257.src.rpm
1d9002c41679564c5b793f65d82cf15c
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-syms-2.6.5-7.257.src.rpm
fb55f67a4cf66887f0046e6759ebc6ce
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/ltmodem-2.6.2-38.23.src.rpm
415ace617e7d083988db2104744dc91f
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-default-2.6.5-7.257.nosrc.rpm
3d6bd83f8ee9c778f391a6422fe227bb
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-docs-2.6.5-7.257.src.rpm
a3a395f746078a8c521f7bd7dc8c45c0
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-smp-2.6.5-7.257.nosrc.rpm
8eaa87737cc95dd9035f4bdcd87c8170
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-source-2.6.5-7.257.src.rpm
a78615451a4cacc0e5c516b67490df17
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-syms-2.6.5-7.257.src.rpm
5ca629212597b78e740f29ded4541abf
Our maintenance customers are notified individually. The packages are
offered for installation from the maintenance web:
SUSE SLES 9
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/1c4ff30ff5ed2a2d0d0586e03348032b.html
SUSE CORE 9 for x86
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/e793251698757eb4bf71b0822baf6a5b.html
SuSE Linux Enterprise Server 8 for IBM S/390 and IBM zSeries
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/308356dbd7f8c72f2c66dad286c511f9.html
SUSE SLES 9 for AMD64 and Intel EM64T
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/a85a3e0133108b1cb77026293bc419dc.html
SUSE SLES 9 for IBM zSeries 64bit
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/d315ac40f92dc38783162cde676a7b10.html
SUSE CORE 9 for IBM S/390 31bit
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/c7910bbd0cc63477f583e6a6b35500ab.html
SUSE SLES 9 for IBM POWER
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/55ecd36eedc87087ae2e28c961faef64.html
SUSE CORE 9 for Itanium Processor Family
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/4a44452b6ec2076b441850a41a2711c4.html
UnitedLinux 1.0
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/6d74d9ddf80228eba4bbce4c1f9e38dd.html
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/4839e281693768ffa93750f8bc54dcf1.html
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/7efe4a0df957d96db9ff8eec18a9e912.html
SuSE Linux Enterprise Server 8 for IBM zSeries
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/a523f4d26f72bbbc2e3168eb07270400.html
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/946c2163106747c7a2bb7fce018ca5b6.html
SuSE Linux Desktop 1.0
http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/ec85d2e9f08af45ecd99f769df304314.html
______________________________________________________________________________
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify <file>
replacing <file> with the name of the file where you saved the
announcement. The output for a valid signature looks like:
gpg: Signature made <DATE> using RSA key ID 3D25D3D9
gpg: Good signature from "SuSE Security Team <security@suse.de>"
where <DATE> is replaced by the date the document was signed.
If the security team's key is not contained in your key ring, you can
import it from the first installation CD. To import the key, use the
command
gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc
- Package authenticity verification:
SUSE update packages are available on many mirror FTP servers all over the
world. While this service is considered valuable and important to the free
and open source software community, the authenticity and the integrity of
a package needs to be verified to ensure that it has not been tampered
with.
There are two verification methods that can be used independently from
each other to prove the authenticity of a downloaded file or RPM package:
1) Using the internal gpg signatures of the rpm package
2) MD5 checksums as provided in this announcement
1) The internal rpm package signatures provide an easy way to verify the
authenticity of an RPM package. Use the command
rpm -v --checksig <file.rpm>
to verify the signature of the package, replacing <file.rpm> with the
filename of the RPM package downloaded. The package is unmodified if it
contains a valid signature from build@suse.de with the key ID 9C800ACA.
This key is automatically imported into the RPM database (on
RPMv4-based distributions) and the gpg key ring of 'root' during
installation. You can also find it on the first installation CD and at
the end of this announcement.
2) If you need an alternative means of verification, use the md5sum
command to verify the authenticity of the packages. Execute the command
md5sum <filename.rpm>
after you downloaded the file from a SUSE FTP server or its mirrors.
Then compare the resulting md5sum with the one that is listed in the
SUSE security announcement. Because the announcement containing the
checksums is cryptographically signed (by security@suse.de), the
checksums show proof of the authenticity of the package if the
signature of the announcement is valid. Note that the md5 sums
published in the SUSE Security Announcements are valid for the
respective packages only. Newer versions of these packages cannot be
verified.
- SUSE runs two security mailing lists to which any interested party may
subscribe:
suse-security@suse.com
- General Linux and SUSE security discussion.
All SUSE security announcements are sent to this list.
To subscribe, send an e-mail to
<suse-security-subscribe@suse.com>.
suse-security-announce@suse.com
- SUSE's announce-only mailing list.
Only SUSE's security announcements are sent to this list.
To subscribe, send an e-mail to
<suse-security-announce-subscribe@suse.com>.
For general information or the frequently asked questions (FAQ),
send mail to <suse-security-info@suse.com> or
<suse-security-faq@suse.com>.
=====================================================================
SUSE's security contact is <security@suse.com> or <security@suse.de>.
The <security@suse.de> public key is listed below.
=====================================================================
______________________________________________________________________________
The information in this advisory may be distributed or reproduced,
provided that the advisory is not modified in any way. In particular, the
clear text signature should show proof of the authenticity of the text.
SUSE Linux Products GmbH provides no warranties of any kind whatsoever
with respect to the information contained in this security advisory.
Type Bits/KeyID Date User ID
pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de>
pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iQEVAwUBRH26R3ey5gA9JdPZAQLpSAf+IZa9QmbGUFeO8ihLM84sEUGCYARIeHG8
1XwzOY9t5f/+cGFNw5b1ANk52likCVj8TaX76N78lo12uY5+LP8QBfE3qzOiSawe
+WXmDPvmDYYyO627GxD5oODWLlxJkWiNw+fty04G3AQx21jAT/2T929rpH1QLe/Q
iK5nQarakjkH+1nuM3LO7EG39lFETLiWeSSBPdffRvhrmch4Q9QiBePTn0ItA1+o
tuwQMiYChmMyeLZgRfcEMqKF+rndIJsZeL40uQJpr1myynjZ8ARVnPXKJTCbwX/W
NglO8o8ohfjBgzKDbnCp//bjVIWydlZws4kIDxtXEDPOnqvZBVYwcg==
=3MnB
-----END PGP SIGNATURE-----