openSUSE Security Update : kernel (kernel-171)

critical Nessus Plugin ID 40009

Synopsis

The remote openSUSE host is missing a security update.

Description

The openSUSE 11.0 kernel was updated to 2.6.25.16.

It fixes various stability bugs and also security bugs.

CVE-2008-1673: Fixed the range checking in the ASN.1 decoder in NAT for SNMP and CIFS, which could have been used by a remote attacker to crash the machine.

CVE-2008-3276: An integer overflow flaw was found in the Linux kernel dccp_setsockopt_change() function. An attacker may leverage this vulnerability to trigger a kernel panic on a victim's machine remotely.

CVE-2008-3272: The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.

CVE-2008-3275: The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ('overflow' of the UBIFS orphan area) via a series of attempted file creations within deleted directories.

Also lots of bugs were fixed.

Solution

Update the affected kernel packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=216857

https://bugzilla.novell.com/show_bug.cgi?id=374099

https://bugzilla.novell.com/show_bug.cgi?id=394667

https://bugzilla.novell.com/show_bug.cgi?id=400815

https://bugzilla.novell.com/show_bug.cgi?id=400874

https://bugzilla.novell.com/show_bug.cgi?id=404892

https://bugzilla.novell.com/show_bug.cgi?id=406637

https://bugzilla.novell.com/show_bug.cgi?id=407689

https://bugzilla.novell.com/show_bug.cgi?id=408734

https://bugzilla.novell.com/show_bug.cgi?id=412823

https://bugzilla.novell.com/show_bug.cgi?id=415607

https://bugzilla.novell.com/show_bug.cgi?id=415690

https://bugzilla.novell.com/show_bug.cgi?id=417505

Plugin Details

Severity: Critical

ID: 40009

File Name: suse_11_0_kernel-080822.nasl

Version: 1.12

Type: local

Agent: unix

Published: 7/21/2009

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:kernel-debug, p-cpe:/a:novell:opensuse:kernel-default, p-cpe:/a:novell:opensuse:kernel-pae, p-cpe:/a:novell:opensuse:kernel-rt, p-cpe:/a:novell:opensuse:kernel-rt_debug, p-cpe:/a:novell:opensuse:kernel-source, p-cpe:/a:novell:opensuse:kernel-syms, p-cpe:/a:novell:opensuse:kernel-vanilla, p-cpe:/a:novell:opensuse:kernel-xen, cpe:/o:novell:opensuse:11.0

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 8/22/2008

Reference Information

CVE: CVE-2008-1673, CVE-2008-3272, CVE-2008-3275, CVE-2008-3276

CWE: 119, 189, 399