Update for ImageMagick, ImageMagick.256, Mozilla... security low

kernel: security and bugfix update.

The openSUSE 11.4 kernel was updated to 2.6.37.6 fixing
lots of bugs and security issues.

Following security issues have been fixed: CVE-2011-1833:
Added a kernel option to ensure ecryptfs is mounting only
on paths belonging to the current ui, which would have
allowed local attackers to potentially gain privileges via
symlink attacks.

CVE-2011-2695: Multiple off-by-one errors in the ext4
subsystem in the Linux kernel allowed local users to cause
a denial of service (BUG_ON and system crash) by accessing
a sparse file in extent format with a write operation
involving a block number corresponding to the largest
possible 32-bit unsigned integer.

CVE-2011-3363: Always check the path in CIFS mounts to
avoid interesting filesystem path interaction issues and
potential crashes.

CVE-2011-2918: In the perf framework software event
overflows could deadlock or delete an uninitialized timer.

CVE-2011-3353: In the fuse filesystem,
FUSE_NOTIFY_INVAL_ENTRY did not check the length of the
write so the message processing could overrun and result in
a BUG_ON() in fuse_copy_fill(). This flaw could be used by
local users able to mount FUSE filesystems to crash the
system.

CVE-2011-2183: Fixed a race between ksmd and other memory
management code, which could result in a NULL ptr
dereference and kernel crash.

CVE-2011-3191: A signedness issue in CIFS could possibly
have lead to to memory corruption, if a malicious server
could send crafted replies to the host.

CVE-2011-1776: The is_gpt_valid function in
fs/partitions/efi.c in the Linux kernel did not check the
size of an Extensible Firmware Interface (EFI) GUID
Partition Table (GPT) entry, which allowed physically
proximate attackers to cause a denial of service
(heap-based buffer overflow and OOPS) or obtain sensitive
information from kernel heap memory by connecting a crafted
GPT storage device, a different vulnerability than
CVE-2011-1577.

Following non-security bugs were fixed:
- novfs: Unable to change password in the Novell Client for
Linux (bnc#713229).
- novfs: last modification time not reliable (bnc#642896).
- novfs: unlink directory after unmap (bnc#649625).
- fs: novfs: Fix exit handlers on local_unlink (bnc#649625).
- novfs: "Unable to save Login Script" appears when trying
to save a user login script (bnc#638985).
- fs: novfs: Limit check for datacopy between user and
kernel space.
- novfs: Fix checking of login id (bnc#626119).
- novfs: Set the sticky bit for the novfs mountpoint
(bnc#686412).

- ACPICA: Fix issues/fault with automatic "serialized"
method support (bnc#678097).

- drm/radeon/kms: Fix I2C mask definitions (bnc#712023).

- ext4: Fix max file size and logical block counting of
extent format file (bnc#706374).

- novfs: fix off-by-one allocation error (bnc#669378
bnc#719710).
- novfs: fix some kmalloc/kfree issues (bnc#669378
bnc#719710).
- novfs: fix some DirCache locking issues (bnc#669378
bnc#719710).

- memsw: remove noswapaccount kernel parameter (bnc#719450).

- Provide memory controller swap extension. Keep the
feature disabled by default. Use swapaccount=1 kernel
boot parameter for enabling it.

- Config cleanups: CONFIG_OLPC should be enabled only for
i386 non PAE

- TTY: pty, fix pty counting (bnc#711203).

- USB: OHCI: fix another regression for NVIDIA controllers
(bnc#682204).

- xen/blkfront: avoid NULL de-reference in CDROM ioctl
handling.

- x86, mtrr: lock stop machine during MTRR rendezvous
sequence (bnc#672008).

Fixed bugs
bnc#711539
VUL-1: kernel: ecryptfs: new option to fix some security vulnerabilities
bnc#713229
Unable to change password in the Novell Client for Linux
bnc#642896
[SLES 11 SP1] Last Modification Time is not reliable
bnc#649625
Desktop becomes unusable if novfsd is restarted.
bnc#638985
"Unable to save Login Script" appears when trying to save a user login script.
bnc#626119
Unable to Login with certain users in the tree.
bnc#686412
File Permissions on a default Novell Client install are world writeable
bnc#678097
Deadlock after: ACPI Error: [CB04] Namespace lookup failure, AE_ALREADY_EXISTS
bnc#712023
System disconnects from display during boot after upgrade to kernel 2.6.34.10
bnc#706374
VUL-0: kernel: ext4: kernel panic with sparse files
bnc#669378
Copying large amounts of data crashes novfsd
bnc#719710
Patch inclusion from previous bug
bnc#718028
VUL-0: CVE-2011-3363: kernel: cifs: always do is_path_accessible check in cifs_mount
bnc#719450
support for memsw cgroup in SLE11SP1
bnc#712366
VUL-1: CVE-2011-2918: kernel: perf: fix software event overflow
bnc#716901
VUL-0: kernel: fuse: check size of FUSE_NOTIFY_INVAL_ENTRY
bnc#697901
VUL-1: kernel: ksm: race between ksmd and exiting task
bnc#711203
/proc/sys/kernel/pty/nr never decreases
bnc#714001
VUL-1: CVE-2011-3191: kernel: cifs: singedness issue in CIFSFindNext()
bnc#682204
Thousands of "hub 2-0:1.0: unable to enumerate USB device on port 5" in messages
bnc#692784
VUL-1: kernel: kernel: fs/partitions: Corrupted GUID partition tables cause oops (AGAIN?)
bnc#672008
[i915, mtrr] Complete system freeze at start
CVE#CVE-2011-1833
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE#CVE-2011-2695
Multiple off-by-one errors in the ext4 subsystem in the Linux kernel before 3.0-rc5 allow local users to cause a denial of service (BUG_ON and system crash) by accessing a sparse file in extent format with a write operation involving a block number corres
CVE#CVE-2011-3363
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE#CVE-2011-2918
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE#CVE-2011-3353
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE#CVE-2011-2183
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE#CVE-2011-3191
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE#CVE-2011-1776
The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service
Selected Binaries