openSUSE Security Update : kernel (kernel-171)

critical Nessus Plugin ID 40009
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

The openSUSE 11.0 kernel was updated to 2.6.25.16.

It fixes various stability bugs and also security bugs.

CVE-2008-1673: Fixed the range checking in the ASN.1 decoder in NAT for SNMP and CIFS, which could have been used by a remote attacker to crash the machine.

CVE-2008-3276: An integer overflow flaw was found in the Linux kernel dccp_setsockopt_change() function. An attacker may leverage this vulnerability to trigger a kernel panic on a victim's machine remotely.

CVE-2008-3272: The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.

CVE-2008-3275: The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ('overflow' of the UBIFS orphan area) via a series of attempted file creations within deleted directories.

Also lots of bugs were fixed.

Solution

Update the affected kernel packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=216857

https://bugzilla.novell.com/show_bug.cgi?id=374099

https://bugzilla.novell.com/show_bug.cgi?id=394667

https://bugzilla.novell.com/show_bug.cgi?id=400815

https://bugzilla.novell.com/show_bug.cgi?id=400874

https://bugzilla.novell.com/show_bug.cgi?id=404892

https://bugzilla.novell.com/show_bug.cgi?id=406637

https://bugzilla.novell.com/show_bug.cgi?id=407689

https://bugzilla.novell.com/show_bug.cgi?id=408734

https://bugzilla.novell.com/show_bug.cgi?id=412823

https://bugzilla.novell.com/show_bug.cgi?id=415607

https://bugzilla.novell.com/show_bug.cgi?id=415690

https://bugzilla.novell.com/show_bug.cgi?id=417505

Plugin Details

Severity: Critical

ID: 40009

File Name: suse_11_0_kernel-080822.nasl

Version: 1.12

Type: local

Agent: unix

Published: 7/21/2009

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:kernel-debug, p-cpe:/a:novell:opensuse:kernel-default, p-cpe:/a:novell:opensuse:kernel-pae, p-cpe:/a:novell:opensuse:kernel-rt, p-cpe:/a:novell:opensuse:kernel-rt_debug, p-cpe:/a:novell:opensuse:kernel-source, p-cpe:/a:novell:opensuse:kernel-syms, p-cpe:/a:novell:opensuse:kernel-vanilla, p-cpe:/a:novell:opensuse:kernel-xen, cpe:/o:novell:opensuse:11.0

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 8/22/2008

Reference Information

CVE: CVE-2008-1673, CVE-2008-3272, CVE-2008-3275, CVE-2008-3276

CWE: 119, 189, 399