The openSUSE 11.3 kernel was updated to fix various bugs and security issues. Following security issues have been fixed: CVE-2010-4347: A local user could inject ACPI code into the kernel via the world-writable “custom_debug” file, allowing local privilege escalation.
There is no known workaround, please install the update packages.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE | 11.3 | x86_64 | kernel-desktop-base | < 2.6.34.7-0.7.1 | kernel-desktop-base-2.6.34.7-0.7.1.x86_64.rpm |
openSUSE | 11.3 | i586 | kernel-ec2 | < 2.6.34.7-0.7.1 | kernel-ec2-2.6.34.7-0.7.1.i586.rpm |
openSUSE | 11.3 | x86_64 | kernel-desktop | < 2.6.34.7-0.7.1 | kernel-desktop-2.6.34.7-0.7.1.x86_64.rpm |
openSUSE | 11.3 | i586 | kernel-vanilla-base | < 2.6.34.7-0.7.1 | kernel-vanilla-base-2.6.34.7-0.7.1.i586.rpm |
openSUSE | 11.3 | x86_64 | preload-kmp-desktop | < 1.1_k2.6.34.7_0.7-19.1.11 | preload-kmp-desktop-1.1_k2.6.34.7_0.7-19.1.11.x86_64.rpm |
openSUSE | 11.3 | x86_64 | kernel-syms | < 2.6.34.7-0.7.1 | kernel-syms-2.6.34.7-0.7.1.x86_64.rpm |
openSUSE | 11.3 | x86_64 | kernel-xen-base | < 2.6.34.7-0.7.1 | kernel-xen-base-2.6.34.7-0.7.1.x86_64.rpm |
openSUSE | 11.3 | x86_64 | kernel-default | < 2.6.34.7-0.7.1 | kernel-default-2.6.34.7-0.7.1.x86_64.rpm |
openSUSE | 11.3 | i586 | kernel-trace | < 2.6.34.7-0.7.1 | kernel-trace-2.6.34.7-0.7.1.i586.rpm |
openSUSE | 11.3 | i586 | kernel-vanilla-devel | < 2.6.34.7-0.7.1 | kernel-vanilla-devel-2.6.34.7-0.7.1.i586.rpm |