SuSE 11 Security Update : Linux kernel (SAT Patch Numbers 927 / 929 / 930)

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.

Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

The Linux kernel on SUSE Linux Enterprise 11 was updated to
and received lots of bugs and security fixes.

The following security issues have been fixed :

- Buffer overflow in fs/cifs/connect.c in CIFS in the
Linux kernel 2.6.29 and earlier allows remote attackers
to cause a denial of service (crash) or potential code
execution via a long nativeFileSystem field in a Tree
Connect response to an SMB mount request.

This requires that kernel can be made to mount a 'cifs' filesystem
from a malicious CIFS server.

- The exit_notify function in kernel/exit.c in the Linux
kernel did not restrict exit signals when the CAP_KILL
capability is held, which allows local users to send an
arbitrary signal to a process by running a program that
modifies the exit_signal field and then uses an exec
system call to launch a setuid application.

The GCC option -fwrapv has been added to compilation to work around
potentially removing integer overflow checks.

- Integer overflow in rose_sendmsg (sys/net/af_rose.c) in
the Linux kernel might allow attackers to obtain
sensitive information via a large length value, which
causes 'garbage' memory to be sent. (CVE-2009-1265)

- The vmx_set_msr function in arch/x86/kvm/vmx.c in the
VMX implementation in the KVM subsystem in the Linux
kernel on the i386 platform allows guest OS users to
cause a denial of service (OOPS) by setting the EFER_LME
(aka 'Long mode enable') bit in the Extended Feature
Enable Register (EFER) model-specific register, which is
specific to the x86_64 platform. (CVE-2009-1242)

- The __inet6_check_established function in
net/ipv6/inet6_hashtables.c in the Linux kernel, when
Network Namespace Support (aka NET_NS) is enabled,
allows remote attackers to cause a denial of service
(NULL pointer dereference and system crash) via vectors
involving IPv6 packets. (CVE-2009-1360)

- drivers/char/agp/generic.c in the agp subsystem in the
Linux kernel does not zero out pages that may later be
available to a user-space process, which allows local
users to obtain sensitive information by reading these
pages. (CVE-2009-1192)

Additionaly a lot of bugs have been fixed and are listed in the RPM

See also :

Solution :

Apply SAT patch number 927 / 929 / 930 as appropriate.

Risk factor :

High / CVSS Base Score : 7.8

Family: SuSE Local Security Checks

Nessus Plugin ID: 41411 ()

Bugtraq ID:

CVE ID: CVE-2009-1192

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now