SuSE Update for kernel SUSE-SA:2007:021

Impact
remote denial of service
Solution
Please Install the Updated Packages.
Insight
The Linux kernel was updated to fix the security problems listed below. This advisory is for the bugs already announced for SUSE Linux Enterprise 10 and SUSE Linux 10.1 in SUSE-SA:2007:018. The packages associated with this update were already released 1 week ago. Please note that bootloader handling in openSUSE 10.2 has changed and now creates new entries for updated kernels and make those the default. We also had reports of the update breaking the bootloader configuration, and apologize for the inconveniences caused. We are investigating those problems and hope to release an update to fix the bootloader handling code. If you are manually adapting /boot/grub/menu.lst, please review this file after the update. - CVE-2006-2936: The ftdi_sio driver allowed local users to cause a denial of service (memory consumption) by writing more data to the serial port than the hardware can handle, which causes the data to be queued. This requires this driver to be loaded, which only happens if such a device is plugged in. - CVE-2006-5751: An integer overflow in the networking bridge ioctl starting with Kernel 2.6.7 could be used by local attackers to overflow kernel memory buffers and potentially escalate privileges. - CVE-2006-6106: Multiple buffer overflows in the cmtp_recv_interopmsg function in the Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel allowed remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via CAPI messages with a large value for the length of the (1) manu (manufacturer) or (2) serial (serial number) field. - CVE-2006-5749: The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux kernel does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash. - CVE-2006-5753: Unspecified vulnerability in the listxattr system call in Linux kernel, when a &quot bad inode&quot is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges. - CVE-2007-0006: The key serial number collision avoidance code in the key_alloc_serial function allows local users to cause a denial of service (crash) via vectors that trigger a null dereference. - CVE-2007-0772: A remote denial of service problem on NFSv2 mounts with ACL enabled was fixed. Furthermore, openSUSE 10.2 catches up to the mainline kernel, version 2.6.18.8, and contains a large number of additional fixes for non security bugs.
Affected
kernel on openSUSE 10.2
References