SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 4471)

This script is Copyright (C) 2007-2012 Tenable Network Security, Inc.

Synopsis :

The remote SuSE 10 host is missing a security-related patch.

Description :

This kernel update fixes the following security problems :

- It was possible for local user to become root by
exploiting a bug in the IA32 system call emulation. This
affects x86_64 platforms with kernel 2.4.x and 2.6.x
before only. (CVE-2007-4573)

- An information disclosure vulnerability in the ALSA
driver can be exploited by local users to read sensitive
data from the kernel memory. (CVE-2007-4571)

and the following non security bugs :

- patches.xen/xen-blkback-cdrom: CDROM removable
media-present attribute plus handling code [#159907]

- patches.drivers/libata-add-pata_dma-kernel-parameter:
libata: Add a drivers/ide style DMA disable [#229260]

- patches.drivers/libata-sata_via-kill-SATA_PATA_SHARING:
sata_via: kill SATA_PATA_SHARING register handling
[#254158] [#309069]

- patches.drivers/libata-sata_via-add-PCI-IDs: sata_via:
add PCI IDs [#254158] [#326647]

- supported.conf: Marked 8250 and 8250_pci as supported
(only Xen kernels build them as modules) [#260686]

- patches.fixes/bridge-module-get-put.patch: Module use
count must be updated as bridges are created/destroyed

- patches.fixes/iscsi-netware-fix: Linux Initiator hard
hangs writing files to NetWare target [#286566]

- patches.fixes/lockd-chroot-fix: Allow lockd to work
reliably with applications in a chroot [#288376]

- add patches.fixes/x86_64-hangcheck_timer-fix.patch fix
monotonic_clock() and hangcheck_timer [#291633]

- patches.arch/sn_hwperf_cpuinfo_fix.diff: Correctly count
CPU objects for SGI ia64/sn hwperf interface [#292240]

- Extend reiserfs to properly support file systems up to
16 TiB [#294754]

- patches.fixes/reiserfs-signedness-fixes.diff: reiserfs:
fix usage of signed ints for block numbers

- patches.fixes/reiserfs-fix-large-fs.diff: reiserfs:
ignore s_bmap_nr on disk for file systems >= 8 TiB

- patches.suse/ocfs2-06-per-resource-events.diff: Deliver
events without a specified resource unconditionally.

- patches.fixes/proc-readdir-race-fix.patch: Fix the race
in proc_pid_readdir [#297232]

- patches.xen/xen3-patch- XEN: update to
Linux [#298719]

- patches.fixes/pm-ordering-fix.patch: PM: Fix ACPI
suspend / device suspend ordering [#302207]

- patches.drivers/ibmvscsi-slave_configure.patch add

->slave_configure() to allow device restart [#304138]

- patches.arch/ppc-power6-ebus-unique_location.patch
Prevent bus_id collisions [#306482]

- patches.xen/30-bit-field-booleans.patch: Fix packet loss
in DomU xen netback driver [#306896]

- config/i386/kdump: Enable ahci module [#308556]

- update patches.drivers/ppc-power6-ehea.patch fix link
state detection for bonding [#309553]

- patches.drivers/ibmveth-fixup-pool_deactivate.patch
patches.drivers/ibmveth-large-mtu.patch: fix serveral
crashes when changing ibmveth sysfs values [#326164]

on-I RQ_WOC: sata_sil24: fix IRQ clearing race when
PCIX_IRQ_WOC is used [#327536]

- update patches.drivers/ibmvscsis.patch set blocksize to
PAGE_CACHE_SIZE to fix flood of bio allocation
warnings/failures [#328219]

Fixes for S/390 :

- IBM Patchcluster 17 [#330036]

- Problem-ID: 38085 - zfcp: zfcp_scsi_eh_abort_handler or
zfcp_scsi_eh_device_reset_handler hanging after CHPID

- Problem-ID: 38491 - zfcp: Error messages when LUN 0 is

- Problem-ID: 37390 - zcrypt: fix PCIXCC/CEX2C error
recovery [#306056]

- Problem-ID: 38500 - kernel: too few page cache pages in
state volatile

- Problem-ID: 38634 - qeth: crash during reboot after
failing online setting

- Problem-ID: 38927 - kernel: shared memory may not be

- Problem-ID: 39069 - cio: Disable channel path
measurements on shutdown/reboot

- Problem-ID: 27787 - qeth: recognize 'exclusively
used'-RC from Hydra3

- Problem-ID: 38330 - qeth: make qeth driver loadable
without ipv6 module

For further description of the named Problem-IDs, please
look to
ober 2005_recommended.html

See also :

Solution :

Apply ZYPP patch number 4471.

Risk factor :

High / CVSS Base Score : 7.2

Family: SuSE Local Security Checks

Nessus Plugin ID: 29488 ()

Bugtraq ID:

CVE ID: CVE-2007-4571

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now