openSUSE Security Update : kernel (kernel-951)

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This kernel update for openSUSE 11.0 fixes some bugs and several
security problems.

The following security issues are fixed: A local denial of service
problem in the splice(2) system call.

CVE-2009-1630: The nfs_permission function in fs/nfs/dir.c in the NFS
client implementation in the Linux kernel when atomic_open is
available, does not check execute (aka EXEC or MAY_EXEC) permission
bits, which allows local users to bypass permissions and execute
files, as demonstrated by files on an NFSv4 fileserver.

CVE-2009-0834: The audit_syscall_entry function in the Linux kernel on
the x86_64 platform did not properly handle (1) a 32-bit process
making a 64-bit syscall or (2) a 64-bit process making a 32-bit
syscall, which allows local users to bypass certain syscall audit
configurations via crafted syscalls.

CVE-2009-1072: nfsd in the Linux kernel did not drop the CAP_MKNOD
capability before handling a user request in a thread, which allows
local users to create device nodes, as demonstrated on a filesystem
that has been exported with the root_squash option.

CVE-2009-0835 The __secure_computing function in kernel/seccomp.c in
the seccomp subsystem in the Linux kernel on the x86_64 platform, when
CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit
process making a 64-bit syscall or (2) a 64-bit process making a
32-bit syscall, which allows local users to bypass intended access
restrictions via crafted syscalls that are misinterpreted as (a) stat
or (b) chmod.

CVE-2009-1439: Buffer overflow in fs/cifs/connect.c in CIFS in the
Linux kernel 2.6.29 and earlier allows remote attackers to cause a
denial of service (crash) or potential code execution via a long
nativeFileSystem field in a Tree Connect response to an SMB mount
request.

This requires that kernel can be made to mount a 'cifs' filesystem
from a malicious CIFS server.

CVE-2009-1337: The exit_notify function in kernel/exit.c in the Linux
kernel did not restrict exit signals when the CAP_KILL capability is
held, which allows local users to send an arbitrary signal to a
process by running a program that modifies the exit_signal field and
then uses an exec system call to launch a setuid application.

CVE-2009-0859: The shm_get_stat function in ipc/shm.c in the shm
subsystem in the Linux kernel, when CONFIG_SHMEM is disabled,
misinterprets the data type of an inode, which allows local users to
cause a denial of service (system hang) via an SHM_INFO shmctl call,
as demonstrated by running the ipcs program. (SUSE is enabling
CONFIG_SHMEM, so is by default not affected, the fix is just for
completeness).

CVE-2009-1242: The vmx_set_msr function in arch/x86/kvm/vmx.c in the
VMX implementation in the KVM subsystem in the Linux kernel on the
i386 platform allows guest OS users to cause a denial of service
(OOPS) by setting the EFER_LME (aka 'Long mode enable') bit in the
Extended Feature Enable Register (EFER) model-specific register, which
is specific to the x86_64 platform.

CVE-2009-1265: Integer overflow in rose_sendmsg (sys/net/af_rose.c) in
the Linux kernel might allow attackers to obtain sensitive information
via a large length value, which causes 'garbage' memory to be sent.

CVE-2009-0028: The clone system call in the Linux kernel allows local
users to send arbitrary signals to a parent process from an
unprivileged child process by launching an additional child process
with the CLONE_PARENT flag, and then letting this new process exit.

CVE-2009-0675: The skfp_ioctl function in drivers/net/skfp/skfddi.c in
the Linux kernel permits SKFP_CLR_STATS requests only when the
CAP_NET_ADMIN capability is absent, instead of when this capability is
present, which allows local users to reset the driver statistics,
related to an 'inverted logic' issue.

CVE-2009-0676: The sock_getsockopt function in net/core/sock.c in the
Linux kernel does not initialize a certain structure member, which
allows local users to obtain potentially sensitive information from
kernel memory via an SO_BSDCOMPAT getsockopt request.

CVE-2009-0322: drivers/firmware/dell_rbu.c in the Linux kernel allows
local users to cause a denial of service (system crash) via a read
system call that specifies zero bytes from the (1) image_type or (2)
packet_size file in /sys/devices/platform/dell_rbu/.

CVE-2009-0269: fs/ecryptfs/inode.c in the eCryptfs subsystem in the
Linux kernel allows local users to cause a denial of service (fault or
memory corruption), or possibly have unspecified other impact, via a
readlink call that results in an error, leading to use of a -1 return
value as an array index.

CVE-2009-0065: Buffer overflow in net/sctp/sm_statefuns.c in the
Stream Control Transmission Protocol (sctp) implementation in the
Linux kernel allows remote attackers to have an unknown impact via an
FWD-TSN (aka FORWARD-TSN) chunk with a large stream ID.

Some other non-security bugs were fixed, please see the RPM changelog.

See also :

https://bugzilla.novell.com/show_bug.cgi?id=399966
https://bugzilla.novell.com/show_bug.cgi?id=407523
https://bugzilla.novell.com/show_bug.cgi?id=408818
https://bugzilla.novell.com/show_bug.cgi?id=429484
https://bugzilla.novell.com/show_bug.cgi?id=462365
https://bugzilla.novell.com/show_bug.cgi?id=463522
https://bugzilla.novell.com/show_bug.cgi?id=465955
https://bugzilla.novell.com/show_bug.cgi?id=465963
https://bugzilla.novell.com/show_bug.cgi?id=470942
https://bugzilla.novell.com/show_bug.cgi?id=470943
https://bugzilla.novell.com/show_bug.cgi?id=472896
https://bugzilla.novell.com/show_bug.cgi?id=478002
https://bugzilla.novell.com/show_bug.cgi?id=478003
https://bugzilla.novell.com/show_bug.cgi?id=482720
https://bugzilla.novell.com/show_bug.cgi?id=483819
https://bugzilla.novell.com/show_bug.cgi?id=483820
https://bugzilla.novell.com/show_bug.cgi?id=487106
https://bugzilla.novell.com/show_bug.cgi?id=487681
https://bugzilla.novell.com/show_bug.cgi?id=490608
https://bugzilla.novell.com/show_bug.cgi?id=492282
https://bugzilla.novell.com/show_bug.cgi?id=492760
https://bugzilla.novell.com/show_bug.cgi?id=492768
https://bugzilla.novell.com/show_bug.cgi?id=495065
https://bugzilla.novell.com/show_bug.cgi?id=496398
https://bugzilla.novell.com/show_bug.cgi?id=497551
https://bugzilla.novell.com/show_bug.cgi?id=497597
https://bugzilla.novell.com/show_bug.cgi?id=498237
https://bugzilla.novell.com/show_bug.cgi?id=502675
https://bugzilla.novell.com/show_bug.cgi?id=503353

Solution :

Update the affected kernel packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now