---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/ The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: SUSE update for kernel SECUNIA ADVISORY ID: SA25226 VERIFY ADVISORY: http://secunia.com/advisories/25226/ CRITICAL: Moderately critical IMPACT: Privilege escalation, DoS, Unknown WHERE: >From remote OPERATING SYSTEM: SUSE Linux 9.3 http://secunia.com/product/4933/ DESCRIPTION: SUSE has issued an update for the kernel. This fixes some vulnerabilities, where one has an unknown impact and others can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges, and by malicious people to cause a DoS. For more information: SA20703 SA23427 SA23529 SA23955 SA24793 SA24618 SOLUTION: Apply updated packages. x86 Platform: SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/Intel-536ep-4.69-10.10.i586.rpm fdef0ae9ea3862c4e00f6994360872b8 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-2.6.11.4-21.17.i586.rpm 05597adee5633418de222195a7c40d44 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-bigsmp-nongpl-2.6.11.4-21.17.i586.rpm b636aa46448deece58538f8c1d3c5c4f ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-2.6.11.4-21.17.i586.rpm 3014be6caa536a7016ecff4ae44eeda7 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-default-nongpl-2.6.11.4-21.17.i586.rpm 860d232b71d75a7007f61fc77b032e66 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-2.6.11.4-21.17.i586.rpm 54b07696cf8cb4f1d7d1b151739ee8b2 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-smp-nongpl-2.6.11.4-21.17.i586.rpm fa0e06f232d995a545be05118fc39609 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-source-2.6.11.4-21.17.i586.rpm af55f08914f29161bf614ca697dd5ff2 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-syms-2.6.11.4-21.17.i586.rpm fe767d1307cafe1c2baf2f03eefb05f2 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-2.6.11.4-21.17.i586.rpm 675dd328bd37afc957b2d73472b92087 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-um-nongpl-2.6.11.4-21.17.i586.rpm 8764dc69a3822dce8dd20f01a8c3e580 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-2.6.11.4-21.17.i586.rpm edb465f61c4ddf94b57877e6b9cfa798 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/kernel-xen-nongpl-2.6.11.4-21.17.i586.rpm 7c719e3764ec9e958a99843ff93b750a ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/ltmodem-8.31a10-7.10.i586.rpm eade8681bd82bc76fbfa7a12bf5ee266 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-install-initrd-1.0-50.11.i586.rpm 851e597bcb8a238a26c1b27d76683132 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/um-host-kernel-2.6.11.4-21.17.i586.rpm a4b8d7eb58d5441ebfca5a8d483dc4e6 Platform Independent: SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/noarch/kernel-docs-2.6.11.4-21.17.noarch.rpm 8b3a50ba429e5a51ce78134fef94abf6 x86-64 Platform: SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-2.6.11.4-21.17.x86_64.rpm bf3d35dc8e67699723cb745f4e68007b ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-default-nongpl-2.6.11.4-21.17.x86_64.rpm fb2467dfb4090fb75d17b41007a39f02 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-2.6.11.4-21.17.x86_64.rpm 2ecc43230b3a8c7f73a884d3a6262b23 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-smp-nongpl-2.6.11.4-21.17.x86_64.rpm d494ce918294e9b24bdbcd1975931cd8 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-source-2.6.11.4-21.17.x86_64.rpm bb7f69f9b81c5875fbebfccdb57c62af ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/kernel-syms-2.6.11.4-21.17.x86_64.rpm 3430571de7938b942cd3d2ea9bc01482 Sources: SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/Intel-536ep-4.69-10.10.src.rpm e99717e4aee96f92ce0091c5757b96e7 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-bigsmp-2.6.11.4-21.17.nosrc.rpm 5c69f6f12b62308a60ed8d9e176f89b5 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-default-2.6.11.4-21.17.nosrc.rpm 15b26cd8982d957b97fa4a42dbea6bb7 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-docs-2.6.11.4-21.17.src.rpm 118a3feff96d107ad250d038cbfb757f ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-smp-2.6.11.4-21.17.nosrc.rpm ddd99e90d4941ffeb9e58f47399111f4 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-source-2.6.11.4-21.17.src.rpm a036fc6a08f2e05ef8a74731d56b59dd ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-syms-2.6.11.4-21.17.src.rpm e2478089fd67694eedae37de1d65e673 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-um-2.6.11.4-21.17.nosrc.rpm 94e5039b8458613c0a6129ea9e2cf747 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/kernel-xen-2.6.11.4-21.17.nosrc.rpm 80b94b463592a6e2d6bbd87dd0a22548 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/ltmodem-8.31a10-7.10.src.rpm cddb366a8ae7195309671d545ca1c644 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/um-host-install-initrd-1.0-50.11.src.rpm 7a5d67be8e978660bb79f2b5eb61de33 ORIGINAL ADVISORY: http://lists.suse.com/archive/suse-security-announce/2007-May/0003.html OTHER REFERENCES: SA20703: http://secunia.com/advisories/20703/ SA23427: http://secunia.com/advisories/23427/ SA23529: http://secunia.com/advisories/23529/ SA23955: http://secunia.com/advisories/23955/ SA24793: http://secunia.com/advisories/24793/ SA24618: http://secunia.com/advisories/24618/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------