-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                kernel
        Announcement ID:        SUSE-SA:2006:057
        Date:                   Thu, 28 Sep 2006 17:00:00 +0000
        Affected Products:      Novell Linux Desktop 9
                                Novell Linux POS 9
                                Open Enterprise Server
                                SUSE LINUX 10.1
                                SUSE LINUX 10.0
                                SUSE LINUX 9.3
                                SUSE LINUX 9.2
                                SUSE SLE 10 DEBUGINFO
                                SUSE SLED 10
                                SUSE SLES 10
                                SUSE SLES 9
        Vulnerability Type:     remote denial of service
        Severity (1-10):        7
        SUSE Default Package:   yes
        Cross-References:       CVE-2006-3468, CVE-2006-3745, CVE-2006-4093

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             various kernel security problems
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report.
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   Various security problems were found and fixed in the Linux kernel.

   We have released updates for following distributions:
   - SUSE Linux Enterprise Server 9 (on September 21st)
   - SUSE Linux Enterprise 10 (on September 26th)
   - SUSE Linux 9.2 up to 10.1 (on September 14th)

   The SUSE Linux Enterprise Server 10 kernel for the S/390 platform is
   still pending due to platform specific issues found in QA and waiting
   for further analysis.

   Following security issues have been addressed:
   - CVE-2006-3745: A double user space copy in a SCTP ioctl allows
                    local attackers to overflow a buffer in the kernel,
                    potentially allowing code execution and privilege
                    escalation.

   - CVE-2006-4093: Local attackers were able to crash PowerPC systems
                    with PPC970 processor using a not correctly disabled
                    privileged instruction ("attn").

   - CVE-2006-3468: Remote attackers able to access an NFS of a ext2 or
                    ext3 filesystem can cause a denial of service (file
                    system panic) via a crafted UDP packet with a V2
                    look up procedure that specifies a bad file handle
                    (inode number), which triggers an error and causes
                    an exported directory to be remounted read-only.

   - Matthias Andree reported a deadlock in the NFS lockd to us, where
     a remote attacker with access to lockd was able to at least crash
     the lockd kernel process and so render NFS exports from this server
     unusable.  This problem existed only in the SUSE Linux 9.2 up to
     10.0 kernels.

   The SUSE Linux Enterprise kernels also received a number of bugfixes,
   not listed here (please refer to the Novell TID pages listed below).

2) Solution or Work-Around

   There is no known workaround, please install the update packages.

3) Special Instructions and Notes

   None.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv 

   to apply the update, replacing  with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.1:
             26ee41f91791f2960f43e0d2c34cf111
             c647ad25d5138e1d283fa02531b7c612
             0655ceb69b59943d93d63e07f803af34
             9f274f216d6d980d71925298198f89ff
             3bbed65fe2d793be471ec0ebca9489bf
             ea0ca06ddd13803a4854bb953127b4e7
             e719ca56ca6b03db836251aa2f42c193
             d64bdf65439078f98c8167ebc8d40eff
             73ef09479e7dd484e039c99090ce532f
             a2127a9be7804e4c6ff781fa25a0f669
             8ab73349be3faecc0b5ead1f1d43a8ce
             9f749594cb21038f6d1ede1122471521
             8cac732b2aa56ee7ca4e2a805d9e1ba0
             2fe40e6a58b5efb8c40343bb2c869d83
             5f560930255f944ec2f977884952571a
             ddf0978610451b0a053069fdf4bc6e73
             7e1a2256a99b7bdc25519855a5e28234
             6c7b0c7a2da71842535c8ec370552e27
             2131ff74613d4b96f3f4c3c9549bdc91
             2f1789a0213dcc06d7cacc5413fbf6af

   SUSE LINUX 10.0:
             2af14df978db016abff71394be91f3d8
             4ec46129e95f86d1923b7ca09fb1de7e
             a85f38ca6fd0249e04d218ebe3c04b4f
             95fb71b8087ed73337b2a3a30ff5b7fc
             ff0e216a784386933362bf7db380b819
             4b545ecf3e2ef7b3d02bdc130afe61a7
             040a65937bea52ee354a44c6e8ea0dd5
             b99214d91edb56eefac0fd7502485e6e
             850a089ddb0a6c97ad78a88a04e45820
             ba0afa63f5cccc66c6a6270264b04894
             fc0157febbcff6f2fb3b8e596ec22bdf
             b50f100866a55617e3b6724740c0dd41
             ccd26549d72a980c616583c4c552dc9b
             3b63fca8d78139ecedc8627707b1588d

   SUSE LINUX 9.3:
             2b8178c9b01b851ba8f5a9ecdcc6f6a4
             152d28fee5c9cd4fb778a8a4c3660226
             2d60e8b3eb5668cecb80299d0d88aa33
             416ff9c4f2fc7dea1cbdc03c6e862351
             25faa5a8ec4792f9fe81730be064542b
             318179da1b704cb58d56c2b788918406
             3431140892a4af27a15bba7cf3941342
             3d4450f5875e2b373a041dd012d4e597
             1db4ce873dd95631365d2d15b0cfe202
             8dd722f05ef44b48f11980dcbf7b6739
             7ead5d3f4e87183b5a746e63bb3af48c
             ce09371496e027006e0a693a56bbdbbb
             f391d767e4cb4ada285618d95be3e23c
             4cdc5561fd4f17991f710e179ba76cac
             9fcc211d480cb3cbdb1555d70b0f7bb9
             ec605260f319746da30a892839b7c1c1

   SUSE LINUX 9.2:
             038656a7cce85c5c86985d15ba0e556d
             7894bdea230a27609e922430f61ef8c1
             a245181f7371eb502c34365d42dc8b3a
             46bb52ad6dd33ba0c54d00f132b8657d
             e6f18530619112a4a870f8fb2fe4dc44
             7f9e8b77ee9aef4f7076ad578d623cb0
             cf7d45606257c1a28f19e77d9f27d0d4
             f0f1443dd8e7642f2d215cb0fef4a74c
             52a6cd1a67bfd3b3523f71ff5593fddb
             f8ddfaedc0c27a7f7f2635992908e11b
             655a456ed974b72b307194fd21e730ee
             185b53741ed424c4763bddf5015e0535
             8ae192eefa7d9760045f6d57ea3d3c02
             6e9c55225262d3b3a03f79dff3644241

   Platform Independent:

   SUSE LINUX 9.3:
             0fad36276d5bae4fc03610c0719a077d

   SUSE LINUX 9.2:
             123eadba5982d48938ff49b75d8bfd93

   Power PC Platform:

   SUSE LINUX 10.1:
             20b5b086a22f22fae0b91d12798b39df
             64d801cdcd4bfdde674ec72c398e7420
             237576cf62c8d529d42cc6d5c687f703
             417368a7cfaba1f67122974224f4cd71
             2c14c599f55356d0bd8241c0043fe560
             d52c2745e3a20d985cf2a3bb6ac65fde
             a7beef801eeb05247bccf4dddea5f48d
             3cb51185fccc353b29c746fb90959cd0
             83a1fc32e74747fd612af24cd46ac943
             6d9721cccbd73f0949c488de60d2723f
             0bbcac956f8ac2a799b9b3d1a39cc84b
             75c1c4739d87ea4b7dc9b7dad427c0d0
             781bc7be83179f251ba5514793425c4c
             86dc31bcd413ef0ccc98966a41fd6c07

   SUSE LINUX 10.0:
             6fdc8658c4605aa4800a3a50f57460fd
             c90240b82bfa0bd20e20a1000fca9207
             21d8fffc3d831ac395d293ce434a3101
             96d98884803aad3c0d6886a208a5d16d
             188959ddae5c169c6c745ed0619f4c1b

   x86-64 Platform:

   SUSE LINUX 10.1:
             407fa7974e9042fa81f3a1ece4b64894
             e38811a6f40c5bb0b5e38bafaeb2a30e
             a4954cd4dbc27ed99453119749075228
             86ea460aeb5f7749bc0ea8e2f5d7f986
             8e3f29905322d570b0f22dd440f15d5a
             b5fb7d58c39ed10cf9a78edf6c6b0e57
             e61f4590776bf88a83480f22396e2353
             a0097406eb277a8a126f182e83acad9f
             64b12b3c69f02f981484941e09dd1305
             c3d37645b7b2be4906d5183e69407196
             12837d37eaa3234edeaba256472943ea
             11b9458db5cd66552811d0da052e47a9
             8f3f08bdc5896c3f0fc8ab629b8845d0
             1523eed567a3e8413ea01253c750e1f3
             1e882a55477b9ad85ee43e0d7185571d
             18bd9ae1d14e1f7cde21ef302c007f2f
             d2573b55f593de8d1695d3a41182ac5c

   SUSE LINUX 10.0:
             07e8e89fc66fe07f36e4d4e09f70a7cb
             30b8b37d91e9c90e88a7d98d597e418c
             3cd105d707c55c893cf8f20d9e57bfe1
             2affd3ce1908e4f20260f70a7b65f540
             ba3484999dc5acdd02d61ce251031f02
             8a84195236b9daf739776049eb163454
             9c84162cb6a4648206eb17d59dd193bc
             eca45a94e1400b2ed794f45c963a02e3

   SUSE LINUX 9.3:
             7516001db6c4da22c1311a4c6fbb81d5
             b5be7f122d6b333e730eaf33dfc2ec32
             cb5ad4009bb96c8e60733f7732626d7c
             e2656b47c8745963677435f4e379092c
             2329c9588f91a765e671b9db01cddcf8
             7a393b3bdf27d0c1f7bd236ed0dd6805

   SUSE LINUX 9.2:
             746c1b1f8080aadb9c6224ed3e2cdbb5
             2e022be7d2f48f73ca28e8ed0e53f6ff
             c9ba42011cf7fe08bf4528cd20cc13c3
             37dba688d48ac29f86889b82af1fc803
             b9ab803971d96f20c0cfdc5970a59912
             0edad8e927be3183d3c32c5530202693

   Sources:

   SUSE LINUX 10.1:
             02047b35925ab3e1ad77152469b5fcfe
             db7a4a3de5958502cb1a0271c218d972
             e0a654f9bf9c0c632a52c77aa7352d08
             7908e6d951e39975d3eb6c92c1bc37e9
             8be0d70f4f6a1965ad9c3bd6550c800a
             167c55c6967fa50bdd93f78883832d03
             007dcc251e8d77fde2fb2d16b54e0c09
             75d155d775f982603a03d7fc81540865
             570ad5f425bd98d328930c073a5592c1
             ee91eb16467c7080a153550f6731665b
             2de232b8508674051fe96476aad1d122
             4cb0833d3f1f60544858a129240adda6
             0f29b25c5c5a6c2cc9fcbc23c53f3479
             45e46db0edafd400bfdab8b58fd206ec
             b28e2812bcbb47e8d3666838513675a6
             aa1e25d84eca64c10f825dde7fb2208a
             85607a495f3a69e8335a5c0e69c421d3
             e7a66c40e16808d5cc72c7637e378637
             3394b2319cd4cda72161db7977ed2359
             10646530f2302ece6e597129dd24113f
             24b94ef552acc2d43f0588c630a1e9b0
             ad593e66581e0b905050a15cc7a65fb8

   SUSE LINUX 10.0:
             5ae584684e85f709d4a871f4de6c4df4
             a3f82ff354aa48d0721f26b14859f27b
             e9b63dc3399d8ddfb649e0aeec323372
             13248d29e9cdbed7d90bbc8d6cbc08d6
             8011760bc1e22c87fd2f3f3fad2d4d45
             3e9c1ff772c853e74b3311ffff6a60d2
             151894265d76bef5b295f16d99e0ef16
             b20b08230e3f7f9f4e685d567f023919
             3b2d4f9d0a5e3131fc355ed38942a65d
             84cc165050a33e8ebe7bb8adaa0dd9c3
             ee4e5fc534f0f34d925b309945721342

   SUSE LINUX 9.3:
             a8cafba62a93b64bc38fc79615b6d590
             44d3eea6d288f9edc59fcc5f6dea4178
             62748061a37469af50b7b9e2fc5fe795
             ecc6e515a2604d9099abf33c94432d65
             fad50e98426d6abbb246017a1627a692
             8c6e300fafb0e1387a0f00c817190da2
             00b0d5d6ec6dbd3cd7eca40f27bdb57f
             9877dbacf6298140c1489bb9bdfd11c6
             a45d90badc71f999edf2faf759890895
             722f60ef83aeba40e56a2f1d89fc3d37
             762d225dd1465436e7b854a35ea1a93e

   SUSE LINUX 9.2:
             35a62f1a4ffb10b4cada1980d82cf45f
             d26b9bc28d4a47189422952f63c27113
             f2d21ad973085053bd882a0f53733678
             8a13bf708aa71befa8ffc7e8ffcf722d
             27651472ede629d5276e818e7189de51
             74181284da47a0164a5314a22c6922c0
             16d3393e60b6f5c9dcb5dd836a9f332b
             cc2ae39d0bf5dd0d00100e66a6867edc
             b0b40a64fb09d2969564b281f1a168d9
             fb30549494b3c02fd9e7bcb0d31487af

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

   SUSE SLED 10 for AMD64 and Intel EM64T
     http://support.novell.com/techcenter/psdb/c36e25c3bc040fa8da0dac65d0a11e20.html

   SUSE SLES 10
     http://support.novell.com/techcenter/psdb/c36e25c3bc040fa8da0dac65d0a11e20.html
     http://support.novell.com/techcenter/psdb/7d34da4852342609ccc4eae93e12e994.html
     http://support.novell.com/techcenter/psdb/5f920b87f4abe21a324ff6def42a562f.html
     http://support.novell.com/techcenter/psdb/897ffd66535d805196af98da15b00f72.html

   SUSE SLED 10
     http://support.novell.com/techcenter/psdb/c36e25c3bc040fa8da0dac65d0a11e20.html
     http://support.novell.com/techcenter/psdb/897ffd66535d805196af98da15b00f72.html

   SUSE SLED 10 for x86
     http://support.novell.com/techcenter/psdb/897ffd66535d805196af98da15b00f72.html

   SUSE CORE 9 for IBM zSeries 64bit
     http://support.novell.com/techcenter/psdb/14f276ed108cb62104b1743ee48bd92b.html

   SUSE CORE 9 for IBM S/390 31bit
     http://support.novell.com/techcenter/psdb/d501672f20f1f468d24344550dbc92e0.html

   SUSE CORE 9 for IBM POWER
     http://support.novell.com/techcenter/psdb/5ba747ab54f313a5bd8726ca99439c15.html

   SUSE CORE 9 for AMD64 and Intel EM64T
     http://support.novell.com/techcenter/psdb/261185f7ea10c374f4fc53453e6ef3d7.html

   SUSE CORE 9 for Itanium Processor Family
     http://support.novell.com/techcenter/psdb/b8565f7473b0f60258a2da4e825025da.html

   Novell Linux Desktop 9
     http://support.novell.com/techcenter/psdb/261185f7ea10c374f4fc53453e6ef3d7.html
     http://support.novell.com/techcenter/psdb/e2ef926c5f7d109a84807c89d6446736.html

   SUSE SLES 9
     http://support.novell.com/techcenter/psdb/14f276ed108cb62104b1743ee48bd92b.html
     http://support.novell.com/techcenter/psdb/d501672f20f1f468d24344550dbc92e0.html
     http://support.novell.com/techcenter/psdb/5ba747ab54f313a5bd8726ca99439c15.html
     http://support.novell.com/techcenter/psdb/261185f7ea10c374f4fc53453e6ef3d7.html
     http://support.novell.com/techcenter/psdb/b8565f7473b0f60258a2da4e825025da.html
     http://support.novell.com/techcenter/psdb/e2ef926c5f7d109a84807c89d6446736.html

   Open Enterprise Server
     http://support.novell.com/techcenter/psdb/e2ef926c5f7d109a84807c89d6446736.html
     http://support.novell.com/techcenter/psdb/25b56bb7bbe0db4e56b56f5edd414e9b.html

   Novell Linux POS 9
     http://support.novell.com/techcenter/psdb/e2ef926c5f7d109a84807c89d6446736.html
     http://support.novell.com/techcenter/psdb/25b56bb7bbe0db4e56b56f5edd414e9b.html

   SUSE CORE 9 for x86
     http://support.novell.com/techcenter/psdb/e2ef926c5f7d109a84807c89d6446736.html
     http://support.novell.com/techcenter/psdb/25b56bb7bbe0db4e56b56f5edd414e9b.html

   SUSE SLE 10 DEBUGINFO for IBM POWER
     http://support.novell.com/techcenter/psdb/7d34da4852342609ccc4eae93e12e994.html

   SUSE SLE 10 DEBUGINFO for IPF
     http://support.novell.com/techcenter/psdb/5f920b87f4abe21a324ff6def42a562f.html

   SUSE SLE 10 DEBUGINFO
     http://support.novell.com/techcenter/psdb/c36e25c3bc040fa8da0dac65d0a11e20.html
     http://support.novell.com/techcenter/psdb/7d34da4852342609ccc4eae93e12e994.html
     http://support.novell.com/techcenter/psdb/5f920b87f4abe21a324ff6def42a562f.html
     http://support.novell.com/techcenter/psdb/897ffd66535d805196af98da15b00f72.html
______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify 

    replacing  with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made  using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team "

    where  is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig 

       to verify the signature of the package, replacing  with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum 

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    For general information or the frequently asked questions (FAQ),
    send mail to  or
    .

    ====================================================================    SUSE's security contact is  or .
    The  public key is listed below.
    ====================================================================

SuSE: 2006-057: kernel security problems Security Update

September 28, 2006
Various security problems were found and fixed in the Linux kernel

Summary


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                kernel
        Announcement ID:        SUSE-SA:2006:057
        Date:                   Thu, 28 Sep 2006 17:00:00 +0000
        Affected Products:      Novell Linux Desktop 9
                                Novell Linux POS 9
                                Open Enterprise Server
                                SUSE LINUX 10.1
                                SUSE LINUX 10.0
                                SUSE LINUX 9.3
                                SUSE LINUX 9.2
                                SUSE SLE 10 DEBUGINFO
                                SUSE SLED 10
                                SUSE SLES 10
                                SUSE SLES 9
        Vulnerability Type:     remote denial of service
        Severity (1-10):        7
        SUSE Default Package:   yes
        Cross-References:       CVE-2006-3468, CVE-2006-3745, CVE-2006-4093

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             various kernel security problems
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Work-Arounds:
            See SUSE Security Summary Report.
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   Various security problems were found and fixed in the Linux kernel.

   We have released updates for following distributions:
   - SUSE Linux Enterprise Server 9 (on September 21st)
   - SUSE Linux Enterprise 10 (on September 26th)
   - SUSE Linux 9.2 up to 10.1 (on September 14th)

   The SUSE Linux Enterprise Server 10 kernel for the S/390 platform is
   still pending due to platform specific issues found in QA and waiting
   for further analysis.

   Following security issues have been addressed:
   - CVE-2006-3745: A double user space copy in a SCTP ioctl allows
                    local attackers to overflow a buffer in the kernel,
                    potentially allowing code execution and privilege
                    escalation.

   - CVE-2006-4093: Local attackers were able to crash PowerPC systems
                    with PPC970 processor using a not correctly disabled
                    privileged instruction ("attn").

   - CVE-2006-3468: Remote attackers able to access an NFS of a ext2 or
                    ext3 filesystem can cause a denial of service (file
                    system panic) via a crafted UDP packet with a V2
                    look up procedure that specifies a bad file handle
                    (inode number), which triggers an error and causes
                    an exported directory to be remounted read-only.

   - Matthias Andree reported a deadlock in the NFS lockd to us, where
     a remote attacker with access to lockd was able to at least crash
     the lockd kernel process and so render NFS exports from this server
     unusable.  This problem existed only in the SUSE Linux 9.2 up to
     10.0 kernels.

   The SUSE Linux Enterprise kernels also received a number of bugfixes,
   not listed here (please refer to the Novell TID pages listed below).

2) Solution or Work-Around

   There is no known workaround, please install the update packages.

3) Special Instructions and Notes

   None.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv 

   to apply the update, replacing  with the filename of the
   downloaded RPM package.


   x86 Platform:

   SUSE LINUX 10.1:
             26ee41f91791f2960f43e0d2c34cf111
             c647ad25d5138e1d283fa02531b7c612
             0655ceb69b59943d93d63e07f803af34
             9f274f216d6d980d71925298198f89ff
             3bbed65fe2d793be471ec0ebca9489bf
             ea0ca06ddd13803a4854bb953127b4e7
             e719ca56ca6b03db836251aa2f42c193
             d64bdf65439078f98c8167ebc8d40eff
             73ef09479e7dd484e039c99090ce532f
             a2127a9be7804e4c6ff781fa25a0f669
             8ab73349be3faecc0b5ead1f1d43a8ce
             9f749594cb21038f6d1ede1122471521
             8cac732b2aa56ee7ca4e2a805d9e1ba0
             2fe40e6a58b5efb8c40343bb2c869d83
             5f560930255f944ec2f977884952571a
             ddf0978610451b0a053069fdf4bc6e73
             7e1a2256a99b7bdc25519855a5e28234
             6c7b0c7a2da71842535c8ec370552e27
             2131ff74613d4b96f3f4c3c9549bdc91
             2f1789a0213dcc06d7cacc5413fbf6af

   SUSE LINUX 10.0:
             2af14df978db016abff71394be91f3d8
             4ec46129e95f86d1923b7ca09fb1de7e
             a85f38ca6fd0249e04d218ebe3c04b4f
             95fb71b8087ed73337b2a3a30ff5b7fc
             ff0e216a784386933362bf7db380b819
             4b545ecf3e2ef7b3d02bdc130afe61a7
             040a65937bea52ee354a44c6e8ea0dd5
             b99214d91edb56eefac0fd7502485e6e
             850a089ddb0a6c97ad78a88a04e45820
             ba0afa63f5cccc66c6a6270264b04894
             fc0157febbcff6f2fb3b8e596ec22bdf
             b50f100866a55617e3b6724740c0dd41
             ccd26549d72a980c616583c4c552dc9b
             3b63fca8d78139ecedc8627707b1588d

   SUSE LINUX 9.3:
             2b8178c9b01b851ba8f5a9ecdcc6f6a4
             152d28fee5c9cd4fb778a8a4c3660226
             2d60e8b3eb5668cecb80299d0d88aa33
             416ff9c4f2fc7dea1cbdc03c6e862351
             25faa5a8ec4792f9fe81730be064542b
             318179da1b704cb58d56c2b788918406
             3431140892a4af27a15bba7cf3941342
             3d4450f5875e2b373a041dd012d4e597
             1db4ce873dd95631365d2d15b0cfe202
             8dd722f05ef44b48f11980dcbf7b6739
             7ead5d3f4e87183b5a746e63bb3af48c
             ce09371496e027006e0a693a56bbdbbb
             f391d767e4cb4ada285618d95be3e23c
             4cdc5561fd4f17991f710e179ba76cac
             9fcc211d480cb3cbdb1555d70b0f7bb9
             ec605260f319746da30a892839b7c1c1

   SUSE LINUX 9.2:
             038656a7cce85c5c86985d15ba0e556d
             7894bdea230a27609e922430f61ef8c1
             a245181f7371eb502c34365d42dc8b3a
             46bb52ad6dd33ba0c54d00f132b8657d
             e6f18530619112a4a870f8fb2fe4dc44
             7f9e8b77ee9aef4f7076ad578d623cb0
             cf7d45606257c1a28f19e77d9f27d0d4
             f0f1443dd8e7642f2d215cb0fef4a74c
             52a6cd1a67bfd3b3523f71ff5593fddb
             f8ddfaedc0c27a7f7f2635992908e11b
             655a456ed974b72b307194fd21e730ee
             185b53741ed424c4763bddf5015e0535
             8ae192eefa7d9760045f6d57ea3d3c02
             6e9c55225262d3b3a03f79dff3644241

   Platform Independent:

   SUSE LINUX 9.3:
             0fad36276d5bae4fc03610c0719a077d

   SUSE LINUX 9.2:
             123eadba5982d48938ff49b75d8bfd93

   Power PC Platform:

   SUSE LINUX 10.1:
             20b5b086a22f22fae0b91d12798b39df
             64d801cdcd4bfdde674ec72c398e7420
             237576cf62c8d529d42cc6d5c687f703
             417368a7cfaba1f67122974224f4cd71
             2c14c599f55356d0bd8241c0043fe560
             d52c2745e3a20d985cf2a3bb6ac65fde
             a7beef801eeb05247bccf4dddea5f48d
             3cb51185fccc353b29c746fb90959cd0
             83a1fc32e74747fd612af24cd46ac943
             6d9721cccbd73f0949c488de60d2723f
             0bbcac956f8ac2a799b9b3d1a39cc84b
             75c1c4739d87ea4b7dc9b7dad427c0d0
             781bc7be83179f251ba5514793425c4c
             86dc31bcd413ef0ccc98966a41fd6c07

   SUSE LINUX 10.0:
             6fdc8658c4605aa4800a3a50f57460fd
             c90240b82bfa0bd20e20a1000fca9207
             21d8fffc3d831ac395d293ce434a3101
             96d98884803aad3c0d6886a208a5d16d
             188959ddae5c169c6c745ed0619f4c1b

   x86-64 Platform:

   SUSE LINUX 10.1:
             407fa7974e9042fa81f3a1ece4b64894
             e38811a6f40c5bb0b5e38bafaeb2a30e
             a4954cd4dbc27ed99453119749075228
             86ea460aeb5f7749bc0ea8e2f5d7f986
             8e3f29905322d570b0f22dd440f15d5a
             b5fb7d58c39ed10cf9a78edf6c6b0e57
             e61f4590776bf88a83480f22396e2353
             a0097406eb277a8a126f182e83acad9f
             64b12b3c69f02f981484941e09dd1305
             c3d37645b7b2be4906d5183e69407196
             12837d37eaa3234edeaba256472943ea
             11b9458db5cd66552811d0da052e47a9
             8f3f08bdc5896c3f0fc8ab629b8845d0
             1523eed567a3e8413ea01253c750e1f3
             1e882a55477b9ad85ee43e0d7185571d
             18bd9ae1d14e1f7cde21ef302c007f2f
             d2573b55f593de8d1695d3a41182ac5c

   SUSE LINUX 10.0:
             07e8e89fc66fe07f36e4d4e09f70a7cb
             30b8b37d91e9c90e88a7d98d597e418c
             3cd105d707c55c893cf8f20d9e57bfe1
             2affd3ce1908e4f20260f70a7b65f540
             ba3484999dc5acdd02d61ce251031f02
             8a84195236b9daf739776049eb163454
             9c84162cb6a4648206eb17d59dd193bc
             eca45a94e1400b2ed794f45c963a02e3

   SUSE LINUX 9.3:
             7516001db6c4da22c1311a4c6fbb81d5
             b5be7f122d6b333e730eaf33dfc2ec32
             cb5ad4009bb96c8e60733f7732626d7c
             e2656b47c8745963677435f4e379092c
             2329c9588f91a765e671b9db01cddcf8
             7a393b3bdf27d0c1f7bd236ed0dd6805

   SUSE LINUX 9.2:
             746c1b1f8080aadb9c6224ed3e2cdbb5
             2e022be7d2f48f73ca28e8ed0e53f6ff
             c9ba42011cf7fe08bf4528cd20cc13c3
             37dba688d48ac29f86889b82af1fc803
             b9ab803971d96f20c0cfdc5970a59912
             0edad8e927be3183d3c32c5530202693

   Sources:

   SUSE LINUX 10.1:
             02047b35925ab3e1ad77152469b5fcfe
             db7a4a3de5958502cb1a0271c218d972
             e0a654f9bf9c0c632a52c77aa7352d08
             7908e6d951e39975d3eb6c92c1bc37e9
             8be0d70f4f6a1965ad9c3bd6550c800a
             167c55c6967fa50bdd93f78883832d03
             007dcc251e8d77fde2fb2d16b54e0c09
             75d155d775f982603a03d7fc81540865
             570ad5f425bd98d328930c073a5592c1
             ee91eb16467c7080a153550f6731665b
             2de232b8508674051fe96476aad1d122
             4cb0833d3f1f60544858a129240adda6
             0f29b25c5c5a6c2cc9fcbc23c53f3479
             45e46db0edafd400bfdab8b58fd206ec
             b28e2812bcbb47e8d3666838513675a6
             aa1e25d84eca64c10f825dde7fb2208a
             85607a495f3a69e8335a5c0e69c421d3
             e7a66c40e16808d5cc72c7637e378637
             3394b2319cd4cda72161db7977ed2359
             10646530f2302ece6e597129dd24113f
             24b94ef552acc2d43f0588c630a1e9b0
             ad593e66581e0b905050a15cc7a65fb8

   SUSE LINUX 10.0:
             5ae584684e85f709d4a871f4de6c4df4
             a3f82ff354aa48d0721f26b14859f27b
             e9b63dc3399d8ddfb649e0aeec323372
             13248d29e9cdbed7d90bbc8d6cbc08d6
             8011760bc1e22c87fd2f3f3fad2d4d45
             3e9c1ff772c853e74b3311ffff6a60d2
             151894265d76bef5b295f16d99e0ef16
             b20b08230e3f7f9f4e685d567f023919
             3b2d4f9d0a5e3131fc355ed38942a65d
             84cc165050a33e8ebe7bb8adaa0dd9c3
             ee4e5fc534f0f34d925b309945721342

   SUSE LINUX 9.3:
             a8cafba62a93b64bc38fc79615b6d590
             44d3eea6d288f9edc59fcc5f6dea4178
             62748061a37469af50b7b9e2fc5fe795
             ecc6e515a2604d9099abf33c94432d65
             fad50e98426d6abbb246017a1627a692
             8c6e300fafb0e1387a0f00c817190da2
             00b0d5d6ec6dbd3cd7eca40f27bdb57f
             9877dbacf6298140c1489bb9bdfd11c6
             a45d90badc71f999edf2faf759890895
             722f60ef83aeba40e56a2f1d89fc3d37
             762d225dd1465436e7b854a35ea1a93e

   SUSE LINUX 9.2:
             35a62f1a4ffb10b4cada1980d82cf45f
             d26b9bc28d4a47189422952f63c27113
             f2d21ad973085053bd882a0f53733678
             8a13bf708aa71befa8ffc7e8ffcf722d
             27651472ede629d5276e818e7189de51
             74181284da47a0164a5314a22c6922c0
             16d3393e60b6f5c9dcb5dd836a9f332b
             cc2ae39d0bf5dd0d00100e66a6867edc
             b0b40a64fb09d2969564b281f1a168d9
             fb30549494b3c02fd9e7bcb0d31487af

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web:

   SUSE SLED 10 for AMD64 and Intel EM64T
     http://support.novell.com/techcenter/psdb/c36e25c3bc040fa8da0dac65d0a11e20.html

   SUSE SLES 10
     http://support.novell.com/techcenter/psdb/c36e25c3bc040fa8da0dac65d0a11e20.html
     http://support.novell.com/techcenter/psdb/7d34da4852342609ccc4eae93e12e994.html
     http://support.novell.com/techcenter/psdb/5f920b87f4abe21a324ff6def42a562f.html
     http://support.novell.com/techcenter/psdb/897ffd66535d805196af98da15b00f72.html

   SUSE SLED 10
     http://support.novell.com/techcenter/psdb/c36e25c3bc040fa8da0dac65d0a11e20.html
     http://support.novell.com/techcenter/psdb/897ffd66535d805196af98da15b00f72.html

   SUSE SLED 10 for x86
     http://support.novell.com/techcenter/psdb/897ffd66535d805196af98da15b00f72.html

   SUSE CORE 9 for IBM zSeries 64bit
     http://support.novell.com/techcenter/psdb/14f276ed108cb62104b1743ee48bd92b.html

   SUSE CORE 9 for IBM S/390 31bit
     http://support.novell.com/techcenter/psdb/d501672f20f1f468d24344550dbc92e0.html

   SUSE CORE 9 for IBM POWER
     http://support.novell.com/techcenter/psdb/5ba747ab54f313a5bd8726ca99439c15.html

   SUSE CORE 9 for AMD64 and Intel EM64T
     http://support.novell.com/techcenter/psdb/261185f7ea10c374f4fc53453e6ef3d7.html

   SUSE CORE 9 for Itanium Processor Family
     http://support.novell.com/techcenter/psdb/b8565f7473b0f60258a2da4e825025da.html

   Novell Linux Desktop 9
     http://support.novell.com/techcenter/psdb/261185f7ea10c374f4fc53453e6ef3d7.html
     http://support.novell.com/techcenter/psdb/e2ef926c5f7d109a84807c89d6446736.html

   SUSE SLES 9
     http://support.novell.com/techcenter/psdb/14f276ed108cb62104b1743ee48bd92b.html
     http://support.novell.com/techcenter/psdb/d501672f20f1f468d24344550dbc92e0.html
     http://support.novell.com/techcenter/psdb/5ba747ab54f313a5bd8726ca99439c15.html
     http://support.novell.com/techcenter/psdb/261185f7ea10c374f4fc53453e6ef3d7.html
     http://support.novell.com/techcenter/psdb/b8565f7473b0f60258a2da4e825025da.html
     http://support.novell.com/techcenter/psdb/e2ef926c5f7d109a84807c89d6446736.html

   Open Enterprise Server
     http://support.novell.com/techcenter/psdb/e2ef926c5f7d109a84807c89d6446736.html
     http://support.novell.com/techcenter/psdb/25b56bb7bbe0db4e56b56f5edd414e9b.html

   Novell Linux POS 9
     http://support.novell.com/techcenter/psdb/e2ef926c5f7d109a84807c89d6446736.html
     http://support.novell.com/techcenter/psdb/25b56bb7bbe0db4e56b56f5edd414e9b.html

   SUSE CORE 9 for x86
     http://support.novell.com/techcenter/psdb/e2ef926c5f7d109a84807c89d6446736.html
     http://support.novell.com/techcenter/psdb/25b56bb7bbe0db4e56b56f5edd414e9b.html

   SUSE SLE 10 DEBUGINFO for IBM POWER
     http://support.novell.com/techcenter/psdb/7d34da4852342609ccc4eae93e12e994.html

   SUSE SLE 10 DEBUGINFO for IPF
     http://support.novell.com/techcenter/psdb/5f920b87f4abe21a324ff6def42a562f.html

   SUSE SLE 10 DEBUGINFO
     http://support.novell.com/techcenter/psdb/c36e25c3bc040fa8da0dac65d0a11e20.html
     http://support.novell.com/techcenter/psdb/7d34da4852342609ccc4eae93e12e994.html
     http://support.novell.com/techcenter/psdb/5f920b87f4abe21a324ff6def42a562f.html
     http://support.novell.com/techcenter/psdb/897ffd66535d805196af98da15b00f72.html
______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Work-Arounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify 

    replacing  with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made  using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team "

    where  is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig 

       to verify the signature of the package, replacing  with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum 

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                .

    For general information or the frequently asked questions (FAQ),
    send mail to  or
    .

    ====================================================================    SUSE's security contact is  or .
    The  public key is listed below.
    ====================================================================

References

Severity

Related News