lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <447dba9b.9ZUfJl7Yp+FTTFvs%meissner@suse.de>
Date: Wed May 31 16:47:48 2006
From: meissner at suse.de (Marcus Meissner)
Subject: SUSE Security Announcement: kernel
	(SUSE-SA:2006:028)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                kernel
        Announcement ID:        SUSE-SA:2006:028
        Date:                   Wed, 31 May 2006 18:00:00 +0000
        Affected Products:      SUSE LINUX 10.0
                                SUSE LINUX 9.3
                                SUSE LINUX 9.2
                                SUSE LINUX 9.1
                                SuSE Linux Desktop 1.0
                                SuSE Linux Enterprise Server 8
                                SUSE SLES 9
                                UnitedLinux 1.0
        Vulnerability Type:     remote denial of service
        Severity (1-10):        7
        SUSE Default Package:   yes
        Cross-References:       CVE-2005-4798, CVE-2006-0095, CVE-2006-0457
                                CVE-2006-0554, CVE-2006-0555, CVE-2006-0557
                                CVE-2006-0741, CVE-2006-0742, CVE-2006-0744
                                CVE-2006-1055, CVE-2006-1056, CVE-2006-1242
                                CVE-2006-1342, CVE-2006-1523, CVE-2006-1524
                                CVE-2006-1525, CVE-2006-1527, CVE-2006-1863
                                CVE-2006-1864, CVE-2006-2271, CVE-2006-2272
                                CVE-2006-2274

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             various kernel security problems
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report.
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   The Linux kernel has been updated to fix various security problems,
   listed below.

   Note that some of the updates have already been released end of last
   week.

   - AppArmor in SUSE Linux 10.0 and SUSE Linux Enterprise Server 9 SP3
     could crash the machine by an negative dentry reference due to
     for instance vanishing path component during a system call of a
     profiled application.

   - AppArmor in SUSE Linux 10.0 and SUSE Linux Enterprise Server 9 SP3
     failed to prevent PTRACE_ME on a confined parent, allowing an
     infected called program to gain the same rights as its parent
     process.

   - CVE-2006-2274: Linux SCTP allows remote attackers to cause a
     denial of service (infinite recursion and crash) via a packet that
     contains two or more DATA fragments, which causes an skb pointer
     to refer back to itself when the full message is reassembled,
     leading to infinite recursion in the sctp_skb_pull function.

   - CVE-2006-2272: Linux SCTP allowed remote attackers to cause a
     denial of service (kernel panic) via incoming IP fragmented (1)
     COOKIE_ECHO and (2) HEARTBEAT SCTP control chunks.

   - CVE-2006-2271: The ECNE chunk handling in Linux SCTP allowed
     remote attackers to cause a denial of service (kernel panic) via
     an unexpected chunk when the session is in CLOSED state.

   - CVE-2006-1864: Due to incorrect argument checking it was possible
     to break out of chroots on smbfs file systems.

   - CVE-2006-1863: Due to incorrect argument checking it was possible
     to break out of chroots on cifs file systems.

   - CVE-2006-1527: NETFILTER SCTP conntrack: Fixed an infinite loop
     in sctp handling, which could be caused by a remote attacker.

   - CVE-2006-1525: IPV4: Fixed a machine crash in ip_route_input that
     could be triggered via the "route" command from local attackers.

   - CVE-2006-1524: shmat: stop mprotect from giving write permission
     to a read-only shared memory attachment.

   - CVE-2006-1523: __group_complete_signal: Removed a bogus BUG_ON which
     could lead to unwanted process crashes.

   - CVE-2006-1342: A minor information leak in SO_ORIGINAL_DST was fixed.

   - CVE-2006-1242: Fix IPv4 IPID generation to avoid possible idle scans
     against the machine.

   - CVE-2006-1056: i386/x86-64: Fix AMD x87 information leak between
     processes.

   - CVE-2006-1055: sysfs: Zero terminate sysfs write buffers.

   - CVE-2006-0744: When the user could have changed %RIP always force IRET.

   - CVE-2006-0742: IA64 only: Don't declare die_if_kernel as noreturn,
     otherwise local attackers can crash the machine.

   - CVE-2006-0741: x86_64 only: Always check that RIPs are canonical
     during signal handling, otherwise local attackers could crash
     the machine.

   - CVE-2006-0557: Add an upper boundary to mempolicy node arguments
     to avoid potentially local crashes.

   - CVE-2006-0555: A normal user was able to panic the NFS client with
     direct I/O.

   - CVE-2006-0554: A XFS ftruncate() bug could expose stale data.

   - CVE-2006-0457: A race condition in the add_key, request_key,
     and keyctl functions allows local users to cause a denial of service
     (crash) or read sensitive kernel memory by modifying the length of
     a string argument between the time that the kernel calculates the
     length and when it copies the data into kernel memory.
     (Please Note that keyctls are not enabled in SUSE Linux up to 10.0).

   - CVE-2006-0095: dm-crypt: Zero key before freeing it to avoid leakage.

   - CVE-2005-4798: Creation of long symlinks on the NFS server could
     crash the client machine.


   Additionally some non security bug fixes include:

   - Lots of bugfixes in the SUSE Linux Enterprise 9 and SUSE Linux
     9.1 kernel.

   - The S/390 tape driver is now opensource and the previous oco drivers
     are no longer supported.

2) Solution or Work-Around

   There is no known workaround, please install the update packages.

3) Special Instructions and Notes

     SPECIAL INSTALLATION INSTRUCTIONS
     =================================
     The following paragraphs guide you through the installation
     process in a step-by-step fashion. The character sequence "****"
     marks the beginning of a new paragraph. In some cases, the steps
     outlined in a particular paragraph may or may not be applicable
     to your situation. Therefore, make sure that you read through
     all of the steps below before attempting any of these
     procedures. All of the commands that need to be executed must be
     run as the superuser 'root'. Each step relies on the steps
     before it to complete successfully.


   **** Step 1: Determine the needed kernel type.

     Use the following command to determine which kind of kernel is
     installed on your system:

       rpm -qf --qf '%{name}\n' /boot/vmlinuz


   **** Step 2: Download the packages for your system.

     Download the kernel RPM package for your distribution with the
     name indicated by Step 1. Starting from SUSE LINUX 9.2, kernel
     modules that are not free were moved to a separate package with
     the suffix '-nongpl' in its name. Download that package as well
     if you rely on hardware that requires non-free drivers, such as
     some ISDN adapters. The list of all kernel RPM packages is
     appended below.

     The kernel-source package does not contain a binary kernel in
     bootable form. Instead, it contains the sources that correspond
     with the binary kernel RPM packages. This package is required to
     build third party add-on modules.


   **** Step 3: Verify authenticity of the packages.

     Verify the authenticity of the kernel RPM package using the
     methods as listed in Section 6 of this SUSE Security
     Announcement.


   **** Step 4: Installing your kernel rpm package.

     Install the rpm package that you have downloaded in Step 2 with
     the command

         rpm -Uhv <FILE>

     replacing <FILE> with the filename of the RPM package
     downloaded.

     Warning: After performing this step, your system may not boot
              unless the following steps have been followed
   	     completely.


   **** Step 5: Configuring and creating the initrd.

     The initrd is a RAM disk that is loaded into the memory of your
     system together with the kernel boot image by the boot loader.
     The kernel uses the content of this RAM disk to execute commands
     that must be run before the kernel can mount its root file
     system. The initrd is typically used to load hard disk
     controller drivers and file system modules. The variable
     INITRD_MODULES in /etc/sysconfig/kernel determines which kernel
     modules are loaded in the initrd.

     After a new kernel rpm has been installed, the initrd must be
     recreated to include the updated kernel modules. Usually this
     happens automatically when installing the kernel rpm. If
     creating the initrd fails for some reason, manually run the
     command

       /sbin/mkinitrd


   **** Step 6: Update the boot loader, if necessary.

     Depending on your software configuration, you either have the
     LILO or GRUB boot loader installed and initialized on your
     system. Use the command

       grep LOADER_TYPE /etc/sysconfig/bootloader

     to find out which boot loader is configured.

     The GRUB boot loader does not require any further action after a
     new kernel has been installed. You may proceed to the next step
     if you are using GRUB.

     If you use the LILO boot loader, lilo must be run to
     reinitialize the boot sector of the hard disk. Usually this
     happens automatically when installing the kernel RPM. In case
     this step fails, run the command

       /sbin/lilo


     Warning: An improperly installed boot loader will render your
              system unbootable.


   **** Step 7: Reboot.

     If all of the steps above have been successfully completed on
     your system, the new kernel including the kernel modules and the
     initrd are ready to boot. The system needs to be rebooted for
     the changes to be active. Make sure that all steps have been
     completed then reboot using the command

       /sbin/shutdown -r now

     Your system will now shut down and restart with the new kernel.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv <file.rpm>

   to apply the update, replacing <file.rpm> with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/Intel-536ep-4.69-14.5.i586.rpm
          3a83b6b2ac93a33ccbef968f91ea1599
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-2.6.13-15.10.i586.rpm
          82d114ebbb80523fcc9c772f15f5bf59
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-nongpl-2.6.13-15.10.i586.rpm
          00b0c272a99a222cdaa8ed2932ed4e72
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-2.6.13-15.10.i586.rpm
          9b6a9c3f4b6e848a22032d6aa60e01ed
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-nongpl-2.6.13-15.10.i586.rpm
          cd834d6bfffe716eb0ba7f65835da3b3
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-2.6.13-15.10.i586.rpm
          6b6a48bdd2acaae2a17006a3266ceb1d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-nongpl-2.6.13-15.10.i586.rpm
          08a960b9f08a18b70cf932ed49bce39c
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-source-2.6.13-15.10.i586.rpm
          f5439ee02ca40c4fb123d15a43082390
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-syms-2.6.13-15.10.i586.rpm
          50556d3b9f06e2a850f16cc37260ae02
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-2.6.13-15.10.i586.rpm
          5546aa0f75ac02c60a98c8530182b125
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-nongpl-2.6.13-15.10.i586.rpm
          4379e54d1bb5da4a0145f18e15a50ebe
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-2.6.13-15.10.i586.rpm
          4a6b8022c5e785ab2da2be4a872baf52
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-nongpl-2.6.13-15.10.i586.rpm
          5c0566baf35363ca22af29bd61bc6117
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/um-host-kernel-2.6.13-15.10.i586.rpm
          15b889451fd0837cd117c9e4b7adf1ab

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/Intel-536ep-4.69-10.6.i586.rpm
          2410d834eab16f1626457bb02b2a1a74
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-2.6.11.4-21.12.i586.rpm
          92d05ecd1c3b69768129ec48f857003c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-nongpl-2.6.11.4-21.12.i586.rpm
          c7d85941249af8919e53fb114f64d9ab
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-2.6.11.4-21.12.i586.rpm
          2ca07b757a0ecbdc2ae162fdbb74fe84
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-nongpl-2.6.11.4-21.12.i586.rpm
          abe9aef7428dcae8d4cb6e10e9160250
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-2.6.11.4-21.12.i586.rpm
          d2881e4ce268834485cc6109d0f053c3
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-nongpl-2.6.11.4-21.12.i586.rpm
          48c6295b8f68d5c80a9f3fbeef1edcc3
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-source-2.6.11.4-21.12.i586.rpm
          a564139b3c87831391474cb9c745ab52
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-syms-2.6.11.4-21.12.i586.rpm
          fce134e65cf241b2c41051af535f9fa5
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-2.6.11.4-21.12.i586.rpm
          174c52764d54f03a47406d0a01370e25
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-nongpl-2.6.11.4-21.12.i586.rpm
          4e0495322a4b2f38da8265df47051c43
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-2.6.11.4-21.12.i586.rpm
          072e3bf41cab06360bd87c30bfb0b15a
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-nongpl-2.6.11.4-21.12.i586.rpm
          1a644cf0d30553f845c44767d009e8d2
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/ltmodem-8.31a10-7.6.i586.rpm
          af5d6fdbcdcf67b15780cfabd6bde63d
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-install-initrd-1.0-50.6.i586.rpm
          eb1ec5422e5dda9558fa8367ff042901
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-kernel-2.6.11.4-21.12.i586.rpm
          5b7745b79e8bd19e42d68628889daa1a

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/Intel-536ep-4.69-5.14.i586.rpm
          b117fe5ca34185091a50c7f2bf17b8c5
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-2.6.8-24.21.i586.rpm
          e6fcd60b751a8811fe3264a5423dddf4
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-bigsmp-nongpl-2.6.8-24.21.i586.rpm
          fe6b529d2ede5d43301db7a8ab12f9bf
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-2.6.8-24.21.i586.rpm
          30f59434537cee4176b2511ed2875184
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-default-nongpl-2.6.8-24.21.i586.rpm
          ef6a69c4982c498bf4f2855a75047f38
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-2.6.8-24.21.i586.rpm
          a3f3ce1148b2f94997108da61ab640a8
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-smp-nongpl-2.6.8-24.21.i586.rpm
          56791a070623ab550e71a14ee329a412
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-source-2.6.8-24.21.i586.rpm
          cead4b081e6a01e0848ec26f652c9b8a
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-syms-2.6.8-24.21.i586.rpm
          c4e9b67ee0740d86e1565c3aaa4ac250
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-2.6.8-24.21.i586.rpm
          854c60aea3df5d4671bf8d902d842214
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/kernel-um-nongpl-2.6.8-24.21.i586.rpm
          e5e1fdcfb20887ca944be07e1ffd5835
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/ltmodem-8.31a8-6.14.i586.rpm
          ffe2733bb885439897af61680dfa386d
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-install-initrd-1.0-48.13.i586.rpm
          ddbb39bfa6ddec0079e57fb378465346
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/um-host-kernel-2.6.8-24.21.i586.rpm
          f98c69a01d4a93d1e3f7eb4a0f81a481

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-bigsmp-2.6.5-7.257.i586.rpm
          d19076aa179801c307fd137ebe10900f
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-default-2.6.5-7.257.i586.rpm
          4a25e927ab95b0173cfafa394f91f207
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-smp-2.6.5-7.257.i586.rpm
          677290d102ac4b238f7c6dd12808f554
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-source-2.6.5-7.257.i586.rpm
          fadc7d71a944ad5e1c3857cc0910cde1
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/kernel-syms-2.6.5-7.257.i586.rpm
          7aeeb6366b2528975004d21e17e1453e
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/ltmodem-2.6.2-38.23.i586.rpm
          93611206083c3d867d7f8e697e0b9683

   Platform Independent:

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/noarch/kernel-docs-2.6.11.4-21.12.noarch.rpm
          c2c3264f47360840d988a878845e0280

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/noarch/kernel-docs-2.6.8-24.21.noarch.rpm
          0c39c810d06835f4e4b4ba3b5283d5e3

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.257.noarch.rpm
          e5c63b4d0d11b19d198b08646c2bfa89
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/noarch/kernel-docs-2.6.5-7.257.noarch.rpm
          ec17f895636cda948927ca6a37e5f990

   Power PC Platform:

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-default-2.6.13-15.10.ppc.rpm
          063b606929bec2b369675009b654c2b3
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-iseries64-2.6.13-15.10.ppc.rpm
          ae9e7b8c030d846dbebd2185d6dc233d
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-ppc64-2.6.13-15.10.ppc.rpm
          922320a95ab56d93147306c6f2a1a0b5
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-source-2.6.13-15.10.ppc.rpm
          ff773fb617e428ad9cb8ccf9e8acccfb
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-syms-2.6.13-15.10.ppc.rpm
          3853da634e2914f6952fbf7378ee050a

   x86-64 Platform:

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-2.6.13-15.10.x86_64.rpm
          f6743cde2b350ff70eb251c855515702
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-nongpl-2.6.13-15.10.x86_64.rpm
          074b1a8d73ddad88067690c46bddddb4
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-2.6.13-15.10.x86_64.rpm
          268b29a0654711992b9583e8528d175a
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-nongpl-2.6.13-15.10.x86_64.rpm
          f6986f14c6f800b7794569b9543f4ffa
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-source-2.6.13-15.10.x86_64.rpm
          696e7f31a7269890f44338b9c81e8614
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-syms-2.6.13-15.10.x86_64.rpm
          d2a85c7eba759d921ceb760b670e24d4
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-2.6.13-15.10.x86_64.rpm
          d1a572732edce8d2163b84d9eb2a6151
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-nongpl-2.6.13-15.10.x86_64.rpm
          ebbadcab9a3b67e58e430a6819c8214d

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-2.6.11.4-21.12.x86_64.rpm
          26fd19dd2b4b76545cb9a2d7d1206980
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-nongpl-2.6.11.4-21.12.x86_64.rpm
          ff1adebf486711688f6d8ec25a2c8442
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-2.6.11.4-21.12.x86_64.rpm
          c7b1d557bf3980023d4be44ffb51029b
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-nongpl-2.6.11.4-21.12.x86_64.rpm
          66ca05be8638d26d85c5335d8b453770
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-source-2.6.11.4-21.12.x86_64.rpm
          a4a01f6e186586ab97eb09cf81f8f71c
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-syms-2.6.11.4-21.12.x86_64.rpm
          ba55d640082d2d2288e4e01f07f9f48e

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-2.6.8-24.21.x86_64.rpm
          7598a1386bff406c10732459ad7daf3f
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-default-nongpl-2.6.8-24.21.x86_64.rpm
          ee103b10429dbedf672e42a6d783d487
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-2.6.8-24.21.x86_64.rpm
          b05fceea2901e5519b5c9e97f9a05422
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-smp-nongpl-2.6.8-24.21.x86_64.rpm
          f1da6bf6bb890f23ec43099beeb8fc33
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-source-2.6.8-24.21.x86_64.rpm
          a35e63ed009211c0f56b45f2663e9f10
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/kernel-syms-2.6.8-24.21.x86_64.rpm
          583513d1ae02adb0581331be8caca884

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-default-2.6.5-7.257.x86_64.rpm
          52a626483d1c45c5083ba02cdce0ccdf
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-smp-2.6.5-7.257.x86_64.rpm
          b4a1fdb2f84017168e646b2b36b46049
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-source-2.6.5-7.257.x86_64.rpm
          7a095385c5f2a11e5c6f277d006d9b60
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/kernel-syms-2.6.5-7.257.x86_64.rpm
          a7d92f0e5fe3a79803b43b8dc32b96be

   Sources:

   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/Intel-536ep-4.69-14.5.src.rpm
          a7b4d8a829b820bf31b1b7ea8fb515a6
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-bigsmp-2.6.13-15.10.nosrc.rpm
          b18631694f0c4a90f7998017a0686da0
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-default-2.6.13-15.10.nosrc.rpm
          8d41d57e04f90958209039bc0e862152
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-iseries64-2.6.13-15.10.nosrc.rpm
          97b6bc393384ea961075ecf3f101fb83
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-ppc64-2.6.13-15.10.nosrc.rpm
          acdfc8e7aef4da43b4c527efe1df62f3
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-smp-2.6.13-15.10.nosrc.rpm
          cbcfb3e48d275ed33597314608dd3737
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.10.nosrc.rpm
          679f570d3af962b4ba92c69be0128f24
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.10.src.rpm
          605aa540269d6c3bee3bee1b7b505301
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-syms-2.6.13-15.10.src.rpm
          c01dd8279fa7899d8d21d84517aa4459
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-um-2.6.13-15.10.nosrc.rpm
          bd99426598c23c5cf4952ed9c0b9cfe5
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-xen-2.6.13-15.10.nosrc.rpm
          27a2fce49d08338273edf412347450e0

   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/Intel-536ep-4.69-10.6.src.rpm
          7a595d7e743780b65db104598cfdb2ca
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-bigsmp-2.6.11.4-21.12.nosrc.rpm
          aba93f8bf280e9b9508b862e2acd8c26
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-default-2.6.11.4-21.12.nosrc.rpm
          2690cdea0a1451ddf39244af68a32f01
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-docs-2.6.11.4-21.12.src.rpm
          375c09c4d956c9a90eb1832fe1b0e7ba
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-smp-2.6.11.4-21.12.nosrc.rpm
          4e89c3f5123a494a22de9975aabdea64
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-source-2.6.11.4-21.12.src.rpm
          829bcfd76fb4bca1a3c6ff4be1c87791
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-syms-2.6.11.4-21.12.src.rpm
          efbc9e5109781d675df5f24ddae4817d
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-um-2.6.11.4-21.12.nosrc.rpm
          b23f55072c9d48bc141be9112335ea2f
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-xen-2.6.11.4-21.12.nosrc.rpm
          0e7d187812622e4a394e82acb36a137e
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/ltmodem-8.31a10-7.6.src.rpm
          adbabf2df36f8f6e31bf7fee3a0e3b19
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/um-host-install-initrd-1.0-50.6.src.rpm
          b30f1abc6f5f589bb96fcfa55b766a23

   SUSE LINUX 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/Intel-536ep-4.69-5.14.src.rpm
          2045cdb339052222eb43897c7f6ec68d
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-bigsmp-2.6.8-24.21.nosrc.rpm
          f57c0c7bfbd3ddb7934d3521e3ad2971
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-default-2.6.8-24.21.nosrc.rpm
          ad5227e1256c47049b1940cd247bf342
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-docs-2.6.8-24.21.src.rpm
          835713dab6b9996a0b504442c5c548fb
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-smp-2.6.8-24.21.nosrc.rpm
          5e5d999ec4074533ff8a334f0ceba606
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-source-2.6.8-24.21.src.rpm
          5ad0caa2141232a2b6e853ca00c0a542
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-syms-2.6.8-24.21.src.rpm
          178da4abc15ce40ef4672f3f90b7b4ff
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/kernel-um-2.6.8-24.21.nosrc.rpm
          a0f46baf2261a7673ad603a31df8105a
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/ltmodem-8.31a8-6.14.src.rpm
          ccb95498165c64de312f15a854a2bd12
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/um-host-install-initrd-1.0-48.13.src.rpm
          5348434281762cd80dee0d2c6fbb48b8

   SUSE LINUX 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-bigsmp-2.6.5-7.257.nosrc.rpm
          2a46b881826169a01adea054ae6910b9
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-default-2.6.5-7.257.nosrc.rpm
          fc59f9c8abb4f3fd81bfa6c2a7e875ad
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-docs-2.6.5-7.257.src.rpm
          3a5014aed0d55e97b5bcdc5545b1845c
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-smp-2.6.5-7.257.nosrc.rpm
          3d9ac7612fa3bb40a7f72bcffd5c8900
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-source-2.6.5-7.257.src.rpm
          1d9002c41679564c5b793f65d82cf15c
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/kernel-syms-2.6.5-7.257.src.rpm
          fb55f67a4cf66887f0046e6759ebc6ce
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/ltmodem-2.6.2-38.23.src.rpm
          415ace617e7d083988db2104744dc91f
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-default-2.6.5-7.257.nosrc.rpm
          3d6bd83f8ee9c778f391a6422fe227bb
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-docs-2.6.5-7.257.src.rpm
          a3a395f746078a8c521f7bd7dc8c45c0
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-smp-2.6.5-7.257.nosrc.rpm
          8eaa87737cc95dd9035f4bdcd87c8170
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-source-2.6.5-7.257.src.rpm
          a78615451a4cacc0e5c516b67490df17
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/kernel-syms-2.6.5-7.257.src.rpm
          5ca629212597b78e740f29ded4541abf

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

   SUSE SLES 9
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/1c4ff30ff5ed2a2d0d0586e03348032b.html

   SUSE CORE 9 for x86
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/e793251698757eb4bf71b0822baf6a5b.html

   SuSE Linux Enterprise Server 8 for IBM S/390 and IBM zSeries
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/308356dbd7f8c72f2c66dad286c511f9.html

   SUSE SLES 9 for AMD64 and Intel EM64T
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/a85a3e0133108b1cb77026293bc419dc.html

   SUSE SLES 9 for IBM zSeries 64bit
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/d315ac40f92dc38783162cde676a7b10.html

   SUSE CORE 9 for IBM S/390 31bit
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/c7910bbd0cc63477f583e6a6b35500ab.html

   SUSE SLES 9 for IBM POWER
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/55ecd36eedc87087ae2e28c961faef64.html

   SUSE CORE 9 for Itanium Processor Family
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/4a44452b6ec2076b441850a41a2711c4.html

   UnitedLinux 1.0
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/6d74d9ddf80228eba4bbce4c1f9e38dd.html
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/4839e281693768ffa93750f8bc54dcf1.html
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/7efe4a0df957d96db9ff8eec18a9e912.html

   SuSE Linux Enterprise Server 8 for IBM zSeries
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/a523f4d26f72bbbc2e3168eb07270400.html

   SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/946c2163106747c7a2bb7fce018ca5b6.html

   SuSE Linux Desktop 1.0
     http://support.novell.com/cgi-bin/search/searchtid.cgi?psdb/ec85d2e9f08af45ecd99f769df304314.html

______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify <file>

    replacing <file> with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made <DATE> using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team <security@...e.de>"

    where <DATE> is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig <file.rpm>

       to verify the signature of the package, replacing <file.rpm> with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@...e.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum <filename.rpm>

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@...e.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@...e.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-subscribe@...e.com>.

    suse-security-announce@...e.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-announce-subscribe@...e.com>.

    For general information or the frequently asked questions (FAQ),
    send mail to <suse-security-info@...e.com> or
    <suse-security-faq@...e.com>.

    =====================================================================
    SUSE's security contact is <security@...e.com> or <security@...e.de>.
    The <security@...e.de> public key is listed below.
    =====================================================================
______________________________________________________________________________

    The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way. In particular, the
    clear text signature should show proof of the authenticity of the text.

    SUSE Linux Products GmbH provides no warranties of any kind whatsoever
    with respect to the information contained in this security advisory.

Type Bits/KeyID     Date       User ID
pub  2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@...e.de>
pub  1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@...e.de>

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2 (GNU/Linux)
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=ypVs
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iQEVAwUBRH26R3ey5gA9JdPZAQLpSAf+IZa9QmbGUFeO8ihLM84sEUGCYARIeHG8
1XwzOY9t5f/+cGFNw5b1ANk52likCVj8TaX76N78lo12uY5+LP8QBfE3qzOiSawe
+WXmDPvmDYYyO627GxD5oODWLlxJkWiNw+fty04G3AQx21jAT/2T929rpH1QLe/Q
iK5nQarakjkH+1nuM3LO7EG39lFETLiWeSSBPdffRvhrmch4Q9QiBePTn0ItA1+o
tuwQMiYChmMyeLZgRfcEMqKF+rndIJsZeL40uQJpr1myynjZ8ARVnPXKJTCbwX/W
NglO8o8ohfjBgzKDbnCp//bjVIWydlZws4kIDxtXEDPOnqvZBVYwcg==
=3MnB
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ