SuSE 11 Security Update : Linux kernel (SAT Patch Number 1753)

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

Indications Everyone using the Linux Kernel on s390x architecture
should update.

Contraindications None.

Problem description

The SUSE Linux Enterprise 11 Kernel was updated to 2.6.27.42 fixing
various bugs and security issues.

The following security issues were fixed :

- A underflow in the e1000 jumbo ethernet frame handling
could be use by link-local remote attackers to crash the
machine or potentially execute code in kernel context.
This requires the attacker to be able to send Jumbo
Frames to the target machine. (CVE-2009-4536)

- A underflow in the e1000e jumbo ethernet frame handling
could be use by link-local remote attackers to crash the
machine or potentially execute code in kernel context.
This requires the attacker to be able to send Jumbo
Frames to the target machine. (CVE-2009-4538)

- drivers/firewire/ohci.c in the Linux kernel, when
packet-per-buffer mode is used, allows local users to
cause a denial of service (NULL pointer dereference and
system crash) or possibly have unknown other impact via
an unspecified ioctl associated with receiving an ISO
packet that contains zero in the payload-length field.
(CVE-2009-4138)

- The ext4_fill_flex_info function in fs/ext4/super.c in
the Linux kernel allows user-assisted remote attackers
to cause a denial of service (divide-by-zero error and
panic) via a malformed ext4 filesystem containing a
super block with a large FLEX_BG group size (aka
s_log_groups_per_flex value). (CVE-2009-4307)

- The ext4_decode_error function in fs/ext4/super.c in the
ext4 filesystem in the Linux kernel before 2.6.32 allows
user-assisted remote attackers to cause a denial of
service (NULL pointer dereference), and possibly have
unspecified other impact, via a crafted read-only
filesystem that lacks a journal. (CVE-2009-4308)

- The poll_mode_io file for the megaraid_sas driver in the
Linux kernel has world-writable permissions, which
allows local users to change the I/O mode of the driver
by modifying this file. (CVE-2009-3939)

- The collect_rx_frame function in
drivers/isdn/hisax/hfc_usb.c in the Linux kernel allows
attackers to have an unspecified impact via a crafted
HDLC packet that arrives over ISDN and triggers a buffer
under-read. (CVE-2009-4005)

- A negative offset in a ioctl in the GDTH RAID driver was
fixed. (CVE-2009-3080)

- Stack-based buffer overflow in the hfs subsystem in the
Linux kernel allows remote attackers to have an
unspecified impact via a crafted Hierarchical File
System (HFS) filesystem, related to the hfs_readdir
function in fs/hfs/dir.c. (CVE-2009-4020)

For a complete list of changes, please look at the RPM changelog.

Solution

Please install the updates provided at the location noted below.

Installation notes

This update is provided as a set of RPM packages that can easily be
installed onto a running system by using the YaST online update
module.

See also :

https://bugzilla.novell.com/show_bug.cgi?id=479304
https://bugzilla.novell.com/show_bug.cgi?id=480524
https://bugzilla.novell.com/show_bug.cgi?id=490030
https://bugzilla.novell.com/show_bug.cgi?id=509066
https://bugzilla.novell.com/show_bug.cgi?id=515645
https://bugzilla.novell.com/show_bug.cgi?id=523487
https://bugzilla.novell.com/show_bug.cgi?id=526819
https://bugzilla.novell.com/show_bug.cgi?id=528811
https://bugzilla.novell.com/show_bug.cgi?id=535939
https://bugzilla.novell.com/show_bug.cgi?id=544763
https://bugzilla.novell.com/show_bug.cgi?id=545367
https://bugzilla.novell.com/show_bug.cgi?id=546449
https://bugzilla.novell.com/show_bug.cgi?id=547357
https://bugzilla.novell.com/show_bug.cgi?id=547370
https://bugzilla.novell.com/show_bug.cgi?id=547474
https://bugzilla.novell.com/show_bug.cgi?id=549567
https://bugzilla.novell.com/show_bug.cgi?id=552033
https://bugzilla.novell.com/show_bug.cgi?id=554197
https://bugzilla.novell.com/show_bug.cgi?id=557180
https://bugzilla.novell.com/show_bug.cgi?id=557668
https://bugzilla.novell.com/show_bug.cgi?id=557683
https://bugzilla.novell.com/show_bug.cgi?id=560055
https://bugzilla.novell.com/show_bug.cgi?id=561621
https://bugzilla.novell.com/show_bug.cgi?id=564374
https://bugzilla.novell.com/show_bug.cgi?id=564381
https://bugzilla.novell.com/show_bug.cgi?id=564382
https://bugzilla.novell.com/show_bug.cgi?id=564712
https://bugzilla.novell.com/show_bug.cgi?id=565267
https://bugzilla.novell.com/show_bug.cgi?id=566480
https://bugzilla.novell.com/show_bug.cgi?id=567376
https://bugzilla.novell.com/show_bug.cgi?id=567684
http://support.novell.com/security/cve/CVE-2009-3080.html
http://support.novell.com/security/cve/CVE-2009-3939.html
http://support.novell.com/security/cve/CVE-2009-4005.html
http://support.novell.com/security/cve/CVE-2009-4020.html
http://support.novell.com/security/cve/CVE-2009-4138.html
http://support.novell.com/security/cve/CVE-2009-4307.html
http://support.novell.com/security/cve/CVE-2009-4308.html
http://support.novell.com/security/cve/CVE-2009-4536.html
http://support.novell.com/security/cve/CVE-2009-4538.html

Solution :

Apply SAT patch number 1753.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 52685 ()

Bugtraq ID:

CVE ID: CVE-2009-3080
CVE-2009-3939
CVE-2009-4005
CVE-2009-4020
CVE-2009-4138
CVE-2009-4307
CVE-2009-4308
CVE-2009-4536
CVE-2009-4538

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now