[SUSE-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for SUSE Linux Enterprise'

Notification of New SUSE Fixlet Messages suse-announcements at bigmail.bigfix.com
Tue Feb 23 03:11:15 PST 2010


Fixlet Site - 'Patches for SUSE Linux Enterprise'
Current Version: 301	Published: Mon, 22 Feb 2010 19:48:43  GMT

New Fixlets:
============

***************************************************************
Title: PATCH-12575 - Security update for pango - SLES9
Severity: <Unspecified>
Fixlet ID: 1257501
Fixlet Link: http://download.novell.com/Download?buildid=rAcrOE2vST8~

Fixlet Description: A long glyph string can trigger a heap-based buffer overflow in pango (CVE-2009-1194). Everyone should install this update. Please see patch page for more detailed information.

***************************************************************
Title: PATCH-12578 - Security update for the Linux kernel - SLES9
Severity: <Unspecified>
Fixlet ID: 1257801
Fixlet Link: http://download.novell.com/Download?buildid=kAk-gn4eDJc~

Fixlet Description: This update fixes various security issues and some bugs in the SUSE Linux Enterprise 9 kernel.   CVE-2009-4005: The collect_rx_frame function in drivers/isdn/hisax/hfc_usb. c in the Linux kernel allows attackers to have an unspecified impact via a crafted HDLC packet that arrives over ISDN and triggers a buffer under-read. CVE-2009-3080: Array index error in the gdth_read_event function in drivers/scsi/gdth. c in the Linux kernel allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request. CVE-2010-0007: Missing CAP_NET_ADMIN checks in the ebtables netfilter code might have allowed local attackers to modify bridge firewall settings. CVE-2009-4536: drivers/net/e1000/e1000_main. c in the e1000 driver in the Linux kernel handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. CVE-2009-3889: The dbg_lvl file for the megaraid_sas driver in the Linux kernel has world-writable permissions, which allows local users to change the (1) behavior and (2) logging level of the driver by modifying this file. CVE-2009-1883: The z90crypt_unlocked_ioctl function in the z90crypt driver in the Linux kernel does not perform a capability check for the Z90QUIESCE operation, which allows local users to leverage euid 0 privileges to force a driver outage. CVE-2009-2903: Memory leak in the appletalk subsystem in the Linux kernel, when the appletalk and ipddp modules are loaded but the ipddp"N" device is not found, allows remote attackers to cause a denial of service (memory consumption) via IP-DDP datagrams. CVE-2009-3621: net/1/af_unix. c in the Linux kernel allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket. CVE-2009-3620: The ATI Rage 128 (aka r128) driver in the Linux kernel does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls. Everyone using the Linux Kernel should update. Please see patch page for more detailed information.

***************************************************************
Title: PATCH-B10012204 - Security update for the Linux kernel - SLES10 SP3
Severity: <Unspecified>
Fixlet ID: 1001220401
Fixlet Link: http://download.novell.com/Download?buildid=vQ20FQpwJTg~

Fixlet Description: This update fixes various bugs and some security issues in the SUSE Linux Enterprise 10 SP 3 kernel. Following security issues were fixed:   CVE-2009-4536: drivers/net/e1000/e1000_main. c in the e1000 driver in the Linux kernel handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. CVE-2009-4538: drivers/net/e1000e/netdev. c in the e1000e driver in the Linux kernel does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets. CVE-2010-0007: Missing CAP_NET_ADMIN checks in the ebtables netfilter code might have allowed local attackers to modify bridge firewall settings. Everyone using the Linux Kernel on x86 architecture should update. Please see patch page for more detailed information.

***************************************************************
Title: PATCH-B10021101 - Security update for fuse - SLED10 SP2
Severity: <Unspecified>
Fixlet ID: 1002110101
Fixlet Link: http://download.novell.com/Download?buildid=aDT5O9uo3Pw~

Fixlet Description: A race condition in fusermount allows non-privileged users to umount any file system (CVE-2009-3297). Everyone should install this update. Please see patch page for more detailed information.

***************************************************************
Title: PATCH-B10021102 - Security update for pango - SLES10 SP2
Severity: <Unspecified>
Fixlet ID: 1002110201
Fixlet Link: http://download.novell.com/Download?buildid=e0kjBbypCVA~

Fixlet Description: A long glyph string can trigger a heap-based buffer overflow in pango (CVE-2009-1194). Everyone should install this update. Please see patch page for more detailed information.

***************************************************************
Title: PATCH-B10021102 - Security update for pango - SLED10 SP2
Severity: <Unspecified>
Fixlet ID: 1002110203
Fixlet Link: http://download.novell.com/Download?buildid=NUtDYWNvwig~

Fixlet Description: A long glyph string can trigger a heap-based buffer overflow in pango (CVE-2009-1194). Everyone should install this update. Please see patch page for more detailed information.

***************************************************************
Title: PATCH-B10021103 - Security update for fuse - SLED10 SP3
Severity: <Unspecified>
Fixlet ID: 1002110301
Fixlet Link: http://download.novell.com/Download?buildid=85trIu8LF2Y~

Fixlet Description: A race condition in fusermount allows non-privileged users to umount any file system (CVE-2009-3297). Everyone should install this update. Please see patch page for more detailed information.

***************************************************************
Title: PATCH-B10021104 - Security update for pango - SLES10 SP3
Severity: <Unspecified>
Fixlet ID: 1002110401
Fixlet Link: http://download.novell.com/Download?buildid=367o15A9KEA~

Fixlet Description: A long glyph string can trigger a heap-based buffer overflow in pango (CVE-2009-1194). Everyone should install this update. Please see patch page for more detailed information.

***************************************************************
Title: PATCH-B10021104 - Security update for pango - SLED10 SP3
Severity: <Unspecified>
Fixlet ID: 1002110403
Fixlet Link: http://download.novell.com/Download?buildid=b5r2NcI8p5A~

Fixlet Description: A long glyph string can trigger a heap-based buffer overflow in pango (CVE-2009-1194). Everyone should install this update. Please see patch page for more detailed information.

***************************************************************
Title: PATCH-B10021601 - Security update for flash-player - SLED10 SP2
Severity: <Unspecified>
Fixlet ID: 1002160101
Fixlet Link: http://download.novell.com/Download?buildid=FBAx0KFHxd8~

Fixlet Description: The following bug has been fixed: Insufficient checks in flash-player allowed malicious flash applets to create illegal cross-domain requests (CVE-2010-0186). The update also fixes a denial of service condition (CVE-2010-0187). Everyone should update. Please see patch page for more detailed information.

***************************************************************
Title: PATCH-B10021602 - Security update for flash-player - SLED10 SP3
Severity: <Unspecified>
Fixlet ID: 1002160201
Fixlet Link: http://download.novell.com/Download?buildid=mk-NoKFrQm8~

Fixlet Description: The following bug has been fixed: Insufficient checks in flash-player allowed malicious flash applets to create illegal cross-domain requests (CVE-2010-0186). The update also fixes a denial of service condition (CVE-2010-0187). Everyone should update. Please see patch page for more detailed information.



More information about the SUSE-Announcements mailing list