Hallo!
Wie sind hier die Meinungen. Sofort Updaten, warten, ganz was anderes?
>-->-- Schnipp --<--<--
Title: Security update for Linux kernel
http://sdb.suse.de/en/psdb/html/813fdf370053f0b3c6c44d3451a5152e.html
Applies to Package: kernel-bigsmp,kernel-default,kernel-smp,kernel-source,kernel-um,kernel-debug,kernel-syms,um-host-kernel,um-host-install-initrd
Product(s): SUSE CORE 9 for x86 Novell Linux Desktop 9 for x86
Release: 20041119
Obsoletes: b2c0e543d119d888678183d358e12a86
Indications
Everyone using the Linux Kernel on x86 architecture should update.
Contraindications
None.
Problem description
This update fixes following security issues in the kernel:
Following additional bugs were fixed:
Solution
Please install the updates provided at the location noted below.
Installation notes
This update is provided as an RPM package that can easily be installed onto a running system.
First, find out which kernel package to download and use,for example with
rpm -qf /boot/vmlinuz
Download the kernel image fitting your setup and the kernel symbols (kernel-syms*.rpm) and install it with either:
In case you are using LILO as bootmanager, please make sure that you also execute the command lilo after installing the update for the system to remain bootable.
Finally, reboot the system with shutdown -r now
>-->-- Schnap --<--<--
mfG
Thorsten
Wie sind hier die Meinungen. Sofort Updaten, warten, ganz was anderes?
>-->-- Schnipp --<--<--
Title: Security update for Linux kernel
http://sdb.suse.de/en/psdb/html/813fdf370053f0b3c6c44d3451a5152e.html
Applies to Package: kernel-bigsmp,kernel-default,kernel-smp,kernel-source,kernel-um,kernel-debug,kernel-syms,um-host-kernel,um-host-install-initrd
Product(s): SUSE CORE 9 for x86 Novell Linux Desktop 9 for x86
Release: 20041119
Obsoletes: b2c0e543d119d888678183d358e12a86
Indications
Everyone using the Linux Kernel on x86 architecture should update.
Contraindications
None.
Problem description
This update fixes following security issues in the kernel:
- Fixed / Added ELF loader error handling where it was missing, which could lead to a local privilege escalation. This was found by Paul Starzetz of isec.pl.
- Fixed several smbfs boundary checking problems which could lead to buffer overflows. This issue was found by Stefan Essern and was assigned the CVE ID CAN-2004-0883.
- Fixed a possible userspace corruptions / data disclosure problem on SMP machines with more than 4 GB of RAM.
- Fixed a denial of service condition in a.out support.
Following additional bugs were fixed:
- Fixed a aic79xx modprobe/rmmod oops.
- Fixed a broken decnet fix.
- Fixed an NFS data corruption problem in readdirplus handling.
Solution
Please install the updates provided at the location noted below.
Installation notes
This update is provided as an RPM package that can easily be installed onto a running system.
First, find out which kernel package to download and use,for example with
rpm -qf /boot/vmlinuz
Download the kernel image fitting your setup and the kernel symbols (kernel-syms*.rpm) and install it with either:
- rpm -Fvh kernel-syms*.rpm kernel-default*.rpm for the default kernel image, or
- rpm -Fhv kernel-syms*.rpm kernel-smp*.rpm for the SMP kernel image with support for up to 64 GB, or
- rpm -Fhv kernel-syms*.rpm kernel-bigsmp*.rpm for the SMP kernel image with support for up to 64 GB
In case you are using LILO as bootmanager, please make sure that you also execute the command lilo after installing the update for the system to remain bootable.
Finally, reboot the system with shutdown -r now
>-->-- Schnap --<--<--
mfG
Thorsten