SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 1900)

medium Nessus Plugin ID 59120

Synopsis

The remote SuSE 10 host is missing a security-related patch.

Description

This kernel update fixes the following security problems :

- A race condition allows local users to gain root privileges by changing the file mode of /proc/self/ files in a way that causes those files (for instance /proc/self/environ) to become setuid root. [#192688].
(CVE-2006-3626)

- A stack-based buffer overflow in CDROM / DVD handling was fixed which could be used by a physical local attacker to crash the kernel or execute code within kernel context, depending on presence of automatic DVD handling in the system. [#190396]. (CVE-2006-2935)

- Due to an argument validation error in prctl(PR_SET_DUMPABLE) a local attacker can easily gain administrator (root) privileges. [#186980].
(CVE-2006-2451)

and the following non security bugs :

- Limit the maximum number of LUNs to 16384 [#185164]

- LSI 1030/MPT Fusion driver hang during error recovery -- Optionally disable QAS [#180100]

- advance buffer pointers in h_copy_rdma() to avoid data corruption [#186444]

Solution

Apply ZYPP patch number 1900.

See Also

http://support.novell.com/security/cve/CVE-2006-2451.html

http://support.novell.com/security/cve/CVE-2006-2935.html

http://support.novell.com/security/cve/CVE-2006-3626.html

Plugin Details

Severity: Medium

ID: 59120

File Name: suse_kernel-1900.nasl

Version: 1.5

Type: local

Agent: unix

Published: 5/17/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.3

CVSS v2

Risk Factor: Medium

Base Score: 6.2

Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/25/2006

Exploitable With

CANVAS (CANVAS)

Reference Information

CVE: CVE-2006-2451, CVE-2006-2935, CVE-2006-3626