---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: SUSE update for kernel SECUNIA ADVISORY ID: SA27912 VERIFY ADVISORY: http://secunia.com/advisories/27912/ CRITICAL: Less critical IMPACT: Unknown, Security Bypass, Privilege escalation, DoS, System access WHERE: >From remote OPERATING SYSTEM: SUSE Linux 10.1 http://secunia.com/product/10796/ SUSE Linux 10 http://secunia.com/product/6221/ SUSE Linux Enterprise Server 10 http://secunia.com/product/12192/ DESCRIPTION: SUSE has issued an update for the kernel. This fixes a weakness, a security issue, and some vulnerabilities, where one has unknown impacts and others can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), and gain escalated privileges, or by malicious people to cause a DoS or potentially compromise a vulnerable system. For more information: SA25771 SA26322 SA26366 SA26934 SA27555 SA27666 SA27842 SOLUTION: Apply updated packages. x86 Platform: SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-bigsmp-2.6.16.54-0.2.3.i586.rpm 6f15faaef5af308b725787c1d88f112a ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-debug-2.6.16.54-0.2.3.i586.rpm 9525009234aab6813f6f854a66b1d332 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-default-2.6.16.54-0.2.3.i586.rpm dd2efcc904dd0d3a29230b4254df5099 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-kdump-2.6.16.54-0.2.3.i586.rpm 98ce0faa78895190bf9e64a7e42f8102 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-smp-2.6.16.54-0.2.3.i586.rpm 6bd7536a4eac2167d0f84c1a7649b75c ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-source-2.6.16.54-0.2.3.i586.rpm 1b90fdb176e5c70a9fecc566640fa431 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-syms-2.6.16.54-0.2.3.i586.rpm f010441a631a2d7641e02c9fc7391623 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-um-2.6.16.54-0.2.3.i586.rpm 7c4de26d65a353d98ede656a215c1465 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-xen-2.6.16.54-0.2.3.i586.rpm a68f1dd46146a368b595bbfa9e8974c3 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/kernel-xenpae-2.6.16.54-0.2.3.i586.rpm 2dfcf234bcf43c80f7732a027f63474e Power PC Platform: SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-default-2.6.16.54-0.2.3.ppc.rpm 9dc8abfa4939e987cee59dcee1ad7eef ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-iseries64-2.6.16.54-0.2.3.ppc.rpm 94fecb76b7d1844555d2ad59b5cb11f7 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-kdump-2.6.16.54-0.2.3.ppc.rpm 29407fb5ea13920c576124fbfc7058f3 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-ppc64-2.6.16.54-0.2.3.ppc.rpm 6c2c816b200c862b5a0accf3606c0ecb ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-source-2.6.16.54-0.2.3.ppc.rpm 6f3cbc3b1301b4a20fe9d31278eb2673 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/kernel-syms-2.6.16.54-0.2.3.ppc.rpm 76da58e98bbb5c82d829228555ea9b30 x86-64 Platform: SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-debug-2.6.16.54-0.2.3.x86_64.rpm 79016901a4789fb33b576702366e4261 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-default-2.6.16.54-0.2.3.x86_64.rpm b4e1255f219f538b5216c0d2c48bc284 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-kdump-2.6.16.54-0.2.3.x86_64.rpm eca119a9f05615554a71b95ffd9ac19e ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-smp-2.6.16.54-0.2.3.x86_64.rpm 7039c9fa22a45ea85a5f8593c5e83240 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-source-2.6.16.54-0.2.3.x86_64.rpm 6053ae084b5fd1aa8afc36f236a1c4ac ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-syms-2.6.16.54-0.2.3.x86_64.rpm 05f59e6811aa70b503b480992d16b803 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/kernel-xen-2.6.16.54-0.2.3.x86_64.rpm 55055698c360d9141b19a78d16b2ce92 Sources: SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-bigsmp-2.6.16.54-0.2.3.nosrc.rpm 7d2b729a49e5f07751ab278e1e7f0e37 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-debug-2.6.16.54-0.2.3.nosrc.rpm 3424b94d005cddc22edaaf2b3cfffb45 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-default-2.6.16.54-0.2.3.nosrc.rpm 2bfe7bd219c63724e1b7291fce3f20bd ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-iseries64-2.6.16.54-0.2.3.nosrc.rpm 2ee076e515f72cfc068f0190302555b5 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-kdump-2.6.16.54-0.2.3.nosrc.rpm 715be91891a3f1d8a2db1f8175cd42a0 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-ppc64-2.6.16.54-0.2.3.nosrc.rpm 0429200453d01761390ab1b5518e1fc7 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-smp-2.6.16.54-0.2.3.nosrc.rpm 2566454d832c10cfdd84c5da3e9cddac ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-source-2.6.16.54-0.2.3.src.rpm 8b654ab7024914969215714520e05e4f ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-syms-2.6.16.54-0.2.3.src.rpm cd9922e7e404d210b1f03ef48a37a5af ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-um-2.6.16.54-0.2.3.nosrc.rpm ddf9fdd3f8e12eceef84ee6de4340f14 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-xen-2.6.16.54-0.2.3.nosrc.rpm 1d7a7057876ce2550579bf424aa39bff ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/kernel-xenpae-2.6.16.54-0.2.3.nosrc.rpm ae4ef7118f0b59ad169e3871fdfe3c54 SUSE Linux Enterprise Desktop 10 SP1 for AMD64 and Intel EM64T http://support.novell.com/techcenter/psdb/cedebf2070cadf7ee6c941a4d0e6eba0.html SUSE Linux Enterprise 10 SP1 DEBUGINFO for IBM zSeries 64bit http://support.novell.com/techcenter/psdb/eb9711b9868acd247e9ed0be3bb86142.html SUSE Linux Enterprise 10 SP1 DEBUGINFO for IBM POWER http://support.novell.com/techcenter/psdb/37043bf4ccbd3272d8b7e37b6b76768b.html SUSE Linux Enterprise 10 SP1 DEBUGINFO for IPF http://support.novell.com/techcenter/psdb/381410915cb05a9468010a8d5853c966.html SUSE Linux Enterprise Server 10 SP1 http://support.novell.com/techcenter/psdb/cedebf2070cadf7ee6c941a4d0e6eba0.html http://support.novell.com/techcenter/psdb/eb9711b9868acd247e9ed0be3bb86142.html http://support.novell.com/techcenter/psdb/37043bf4ccbd3272d8b7e37b6b76768b.html http://support.novell.com/techcenter/psdb/381410915cb05a9468010a8d5853c966.html http://support.novell.com/techcenter/psdb/9bd2fb953279a9c0f9e9b139ba46d357.html SLE SDK 10 SP1 http://support.novell.com/techcenter/psdb/cedebf2070cadf7ee6c941a4d0e6eba0.html http://support.novell.com/techcenter/psdb/37043bf4ccbd3272d8b7e37b6b76768b.html http://support.novell.com/techcenter/psdb/381410915cb05a9468010a8d5853c966.html http://support.novell.com/techcenter/psdb/9bd2fb953279a9c0f9e9b139ba46d357.html SUSE Linux Enterprise 10 SP1 DEBUGINFO http://support.novell.com/techcenter/psdb/cedebf2070cadf7ee6c941a4d0e6eba0.html http://support.novell.com/techcenter/psdb/37043bf4ccbd3272d8b7e37b6b76768b.html http://support.novell.com/techcenter/psdb/381410915cb05a9468010a8d5853c966.html http://support.novell.com/techcenter/psdb/9bd2fb953279a9c0f9e9b139ba46d357.html SUSE Linux Enterprise Desktop 10 SP1 http://support.novell.com/techcenter/psdb/cedebf2070cadf7ee6c941a4d0e6eba0.html http://support.novell.com/techcenter/psdb/9bd2fb953279a9c0f9e9b139ba46d357.html SUSE Linux Enterprise Desktop 10 SP1 for x86 http://support.novell.com/techcenter/psdb/9bd2fb953279a9c0f9e9b139ba46d357.html ORIGINAL ADVISORY: http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html OTHER REFERENCES: SA25771: http://secunia.com/advisories/25771/ SA26322: http://secunia.com/advisories/26322/ SA26366: http://secunia.com/advisories/26366/ SA26934: http://secunia.com/advisories/26934/ SA27555: http://secunia.com/advisories/27555/ SA27666: http://secunia.com/advisories/27666/ SA27842: http://secunia.com/advisories/27842/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------