TITLE: SUSE update for kernel SECUNIA ADVISORY ID: SA18788 VERIFY ADVISORY: http://secunia.com/advisories/18788/ CRITICAL: Moderately critical IMPACT: Security Bypass, Exposure of sensitive information, DoS WHERE: >From remote OPERATING SYSTEM: SUSE Linux 10 http://secunia.com/product/6221/ DESCRIPTION: SUSE has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by local users to gain knowledge of potentially sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service), or by malicious people to cause a DoS. For more information: SA18487 SA18216 SA17786 SA18766 SOLUTION: Apply updated packages. -- x86 Platform -- SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/Intel-536ep-4.69-14.3.i586.rpm 617123d586215e94e373797650689b7f ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-2.6.13-15.8.i586.rpm 0cbb96d083eb5c5cb6f14896b156d3d6 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-bigsmp-nongpl-2.6.13-15.8.i586.rpm 9da719c36eb4119165d5cd70bfb98703 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-2.6.13-15.8.i586.rpm e84cf4f754e2dbad45d32f22764ac363 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-default-nongpl-2.6.13-15.8.i586.rpm 96556ee27a4a34ad2757fe0605f56e0a ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-2.6.13-15.8.i586.rpm 6bcc5556183a30d5be7164229f1a9b2a ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-smp-nongpl-2.6.13-15.8.i586.rpm 78883d88c7cca8f55676c6ad8fae8f74 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-source-2.6.13-15.8.i586.rpm 566deccc17d66d38037829b04cd90bf6 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-syms-2.6.13-15.8.i586.rpm 98dd96111ed5932e29f17bdea8785ad4 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-2.6.13-15.8.i586.rpm 37d53ae4b23984e6c2c1eccf2cab1418 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-um-nongpl-2.6.13-15.8.i586.rpm 9486e2bbba0809d01469eb8ce2862e45 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-2.6.13-15.8.i586.rpm 916db787417eb6714f4ef29e2b4fc215 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/kernel-xen-nongpl-2.6.13-15.8.i586.rpm c9f178ee29025e37fad02fc97f54a960 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/um-host-kernel-2.6.13-15.8.i586.rpm b7bd6a96c6f4e484c71121d928ccd88c ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-3.0_8259-0.1.i586.rpm a45eca7e51d5013a33c911ea1a4cfee2 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-devel-3.0_8259-0.1.i586.rpm da838d086ab74ae26217fdefd48536ae ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-doc-html-3.0_8259-0.1.i586.rpm 803b0ce83f4a3a08988b3af39f187158 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-doc-pdf-3.0_8259-0.1.i586.rpm 9224d203e3466d1bf9a44ccfa0811471 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-doc-ps-3.0_8259-0.1.i586.rpm a9b0794189169f88275922da3e3e8566 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-tools-3.0_8259-0.1.i586.rpm 3c39e8fadf994ba48c77f429d6d57b89 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xen-tools-ioemu-3.0_8259-0.1.i586.rpm 08559ccb01107e018ac9b1bdf8b6be65 -- Power PC Platform -- SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-default-2.6.13-15.8.ppc.rpm 9809772427eb306647e818d806a77e89 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-iseries64-2.6.13-15.8.ppc.rpm e180170929a1ea8d3f98331bcfb30c9b ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-ppc64-2.6.13-15.8.ppc.rpm 87a70ccab5ba54792dee4aa10c793842 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-source-2.6.13-15.8.ppc.rpm b87c03b2d486fd03c3fac0b3d2a6a226 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/kernel-syms-2.6.13-15.8.ppc.rpm 7dade40bb01bd88a8b0fe59d1305f5c8 -- x86-64 Platform -- SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-2.6.13-15.8.x86_64.rpm 1b257b185e8eedfc3d8fbded87ad78d7 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-default-nongpl-2.6.13-15.8.x86_64.rpm 602f86133787c0ecc8eec89b23d54315 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-2.6.13-15.8.x86_64.rpm 1a60423b90616a8cbe9f709f3af24788 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-smp-nongpl-2.6.13-15.8.x86_64.rpm 95a1d602ec636d83429e326c5d72a6ac ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-source-2.6.13-15.8.x86_64.rpm 72998ee6616db4d71eb5f6830b02775d ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-syms-2.6.13-15.8.x86_64.rpm 8dbeccfea33a188e645c49d18b489ec8 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-2.6.13-15.8.x86_64.rpm f8b7244ffdfce6cd10a63793bfff91c1 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/kernel-xen-nongpl-2.6.13-15.8.x86_64.rpm 3a1b868760ccfcd9e58a99d0cc2e6e10 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-3.0_8259-0.1.x86_64.rpm bf63af95f1460384576fe544497a69d9 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-devel-3.0_8259-0.1.x86_64.rpm b40992546fe02ba8c1b575ea0d219459 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-doc-html-3.0_8259-0.1.x86_64.rpm 89ebeb3a359c3bea923579d557ddd799 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-doc-pdf-3.0_8259-0.1.x86_64.rpm 596a4325239ea8b18dd13a2f32a23fd9 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-doc-ps-3.0_8259-0.1.x86_64.rpm a0dec51273e8b67313cb7001efa4e555 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-tools-3.0_8259-0.1.x86_64.rpm 88ec4608838d3c0175412d4f9a3a722b ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/xen-tools-ioemu-3.0_8259-0.1.x86_64.rpm c4d1a2fb18cc12cc670eaecbcc52e51e -- Sources -- SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/Intel-536ep-4.69-14.3.src.rpm 318b6e58e9618c58b45b442402f02d8d ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-bigsmp-2.6.13-15.8.nosrc.rpm a8106394b8179741f4abe6c5033b825b ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-default-2.6.13-15.8.nosrc.rpm 15357679ff39d7d172915286cf366a02 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-iseries64-2.6.13-15.8.nosrc.rpm 4819d48418dd04d54a6a2cc95ae743dd ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-ppc64-2.6.13-15.8.nosrc.rpm 07716c45346938286197c12459139f1d ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-smp-2.6.13-15.8.nosrc.rpm 1f0626d1a7a4f9512a68787369110323 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.8.nosrc.rpm 0d54d3a5531ca860327a42d026d6a5ed ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-source-2.6.13-15.8.src.rpm de47591367758860be95265cf81a514b ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-syms-2.6.13-15.8.src.rpm 807f7d1ffde7604cf90198237b3db382 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-um-2.6.13-15.8.nosrc.rpm 859c7778b1138f4a6a650ca855d81d09 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/kernel-xen-2.6.13-15.8.nosrc.rpm 131b8f17f1aa4ea060bcc1d3a6148756 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/xen-3.0_8259-0.1.src.rpm 75b98cae0e6d1c682e70309bb975060b ORIGINAL ADVISORY: http://www.novell.com/linux/security/advisories/2006_06_kernel.html OTHER REFERENCES: SA18487: http://secunia.com/advisories/18487/ SA18216: http://secunia.com/advisories/18216/ SA17786: http://secunia.com/advisories/17786/ SA18766: http://secunia.com/advisories/18766/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------