SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 5375)

High Nessus Plugin ID 33432

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.7

Synopsis

The remote SuSE 10 host is missing a security-related patch.

Description

This kernel update fixes quite a number of security problems :

- A remote attacker could crash the IPSec/IPv6 stack by sending a bad ESP packet. This requires the host to be able to receive such packets (default filtered by the firewall). (CVE-2007-6282)

- A problem in SIT IPv6 tunnel handling could be used by remote attackers to immediately crash the machine.
(CVE-2008-2136)

- On x86_64 a denial of service attack could be used by local attackers to immediately panic / crash the machine. (CVE-2008-1615)

- An information leakage during coredumping of root processes was fixed. (CVE-2007-6206)

- Fixed a SMP ordering problem in fcntl_setlk could potentially allow local attackers to execute code by timing file locking. (CVE-2008-1669)

- Fixed a dnotify race condition, which could be used by local attackers to potentially execute code.
(CVE-2008-1375)

- A ptrace bug could be used by local attackers to hang their own processes indefinitely. (CVE-2007-5500)

- Clear the 'direction' flag before calling signal handlers. For specific not yet identified programs under specific timing conditions this could potentially have caused memory corruption or code execution.
(CVE-2008-1367)

- The isdn_ioctl function in isdn_common.c allowed local users to cause a denial of service via a crafted ioctl struct in which ioctls is not null terminated, which triggers a buffer overflow. (CVE-2007-6151)

Non security related changes :

OCFS2 was updated to version v1.2.9-1-r3100.

Also a huge number of bugs were fixed. Please refer to the RPM changelog for a detailed list.

Solution

Apply ZYPP patch number 5375.

See Also

http://support.novell.com/security/cve/CVE-2007-5500.html

http://support.novell.com/security/cve/CVE-2007-6151.html

http://support.novell.com/security/cve/CVE-2007-6206.html

http://support.novell.com/security/cve/CVE-2007-6282.html

http://support.novell.com/security/cve/CVE-2008-1367.html

http://support.novell.com/security/cve/CVE-2008-1375.html

http://support.novell.com/security/cve/CVE-2008-1615.html

http://support.novell.com/security/cve/CVE-2008-1669.html

http://support.novell.com/security/cve/CVE-2008-2136.html

Plugin Details

Severity: High

ID: 33432

File Name: suse_kernel-5375.nasl

Version: 1.18

Type: local

Agent: unix

Published: 2008/07/08

Updated: 2019/10/25

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 6.7

CVSS v2.0

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2008/06/23

Reference Information

CVE: CVE-2007-5500, CVE-2007-6151, CVE-2007-6206, CVE-2007-6282, CVE-2008-1367, CVE-2008-1375, CVE-2008-1615, CVE-2008-1669, CVE-2008-2136

CWE: 16, 94, 119, 362, 399