openSUSE Security Update : kernel (kernel-1749)

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

The openSUSE 11.1 Kernel was updated to 2.6.27.42 fixing various bugs
and security issues.

Following security issues were fixed: CVE-2009-4536: A underflow in
the e1000 jumbo ethernet frame handling could be use by link-local
remote attackers to crash the machine or potentially execute code in
kernel context. This requires the attacker to be able to send Jumbo
Frames to the target machine.

CVE-2009-4538: A underflow in the e1000e jumbo ethernet frame handling
could be use by link-local remote attackers to crash the machine or
potentially execute code in kernel context. This requires the attacker
to be able to send Jumbo Frames to the target machine.

CVE-2009-4138: drivers/firewire/ohci.c in the Linux kernel, when
packet-per-buffer mode is used, allows local users to cause a denial
of service (NULL pointer dereference and system crash) or possibly
have unknown other impact via an unspecified ioctl associated with
receiving an ISO packet that contains zero in the payload-length
field.

CVE-2009-4307: The ext4_fill_flex_info function in fs/ext4/super.c in
the Linux kernel allows user-assisted remote attackers to cause a
denial of service (divide-by-zero error and panic) via a malformed
ext4 filesystem containing a super block with a large FLEX_BG group
size (aka s_log_groups_per_flex value).

CVE-2009-4308: The ext4_decode_error function in fs/ext4/super.c in
the ext4 filesystem in the Linux kernel before 2.6.32 allows
user-assisted remote attackers to cause a denial of service (NULL
pointer dereference), and possibly have unspecified other impact, via
a crafted read-only filesystem that lacks a journal.

CVE-2009-3939: The poll_mode_io file for the megaraid_sas driver in
the Linux kernel has world-writable permissions, which allows local
users to change the I/O mode of the driver by modifying this file.

CVE-2009-4005: The collect_rx_frame function in
drivers/isdn/hisax/hfc_usb.c in the Linux kernel allows attackers to
have an unspecified impact via a crafted HDLC packet that arrives over
ISDN and triggers a buffer under-read.

CVE-2009-3080: A negative offset in a ioctl in the GDTH RAID driver
was fixed.

CVE-2009-4020: Stack-based buffer overflow in the hfs subsystem in the
Linux kernel allows remote attackers to have an unspecified impact via
a crafted Hierarchical File System (HFS) filesystem, related to the
hfs_readdir function in fs/hfs/dir.c.

For a complete list of changes, please look at the RPM changelog.

See also :

https://bugzilla.novell.com/show_bug.cgi?id=479304
https://bugzilla.novell.com/show_bug.cgi?id=480524
https://bugzilla.novell.com/show_bug.cgi?id=490030
https://bugzilla.novell.com/show_bug.cgi?id=509066
https://bugzilla.novell.com/show_bug.cgi?id=515645
https://bugzilla.novell.com/show_bug.cgi?id=523487
https://bugzilla.novell.com/show_bug.cgi?id=526819
https://bugzilla.novell.com/show_bug.cgi?id=528811
https://bugzilla.novell.com/show_bug.cgi?id=535939
https://bugzilla.novell.com/show_bug.cgi?id=544763
https://bugzilla.novell.com/show_bug.cgi?id=545367
https://bugzilla.novell.com/show_bug.cgi?id=546449
https://bugzilla.novell.com/show_bug.cgi?id=547357
https://bugzilla.novell.com/show_bug.cgi?id=547370
https://bugzilla.novell.com/show_bug.cgi?id=547474
https://bugzilla.novell.com/show_bug.cgi?id=549567
https://bugzilla.novell.com/show_bug.cgi?id=552033
https://bugzilla.novell.com/show_bug.cgi?id=554197
https://bugzilla.novell.com/show_bug.cgi?id=557180
https://bugzilla.novell.com/show_bug.cgi?id=557668
https://bugzilla.novell.com/show_bug.cgi?id=557683
https://bugzilla.novell.com/show_bug.cgi?id=560055
https://bugzilla.novell.com/show_bug.cgi?id=561621
https://bugzilla.novell.com/show_bug.cgi?id=564374
https://bugzilla.novell.com/show_bug.cgi?id=564381
https://bugzilla.novell.com/show_bug.cgi?id=564382
https://bugzilla.novell.com/show_bug.cgi?id=564712
https://bugzilla.novell.com/show_bug.cgi?id=565267
https://bugzilla.novell.com/show_bug.cgi?id=566480
https://bugzilla.novell.com/show_bug.cgi?id=567376
https://bugzilla.novell.com/show_bug.cgi?id=567684

Solution :

Update the affected kernel packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 44034 ()

Bugtraq ID:

CVE ID: CVE-2009-3080
CVE-2009-3939
CVE-2009-4005
CVE-2009-4020
CVE-2009-4138
CVE-2009-4307
CVE-2009-4308
CVE-2009-4536
CVE-2009-4538

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now