SuSE 11 Security Update : Linux kernel (SAT Patch Number 1753)

critical Nessus Plugin ID 52685

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

Indications Everyone using the Linux Kernel on s390x architecture should update.

Contraindications None.

Problem description

The SUSE Linux Enterprise 11 Kernel was updated to 2.6.27.42 fixing various bugs and security issues.

The following security issues were fixed :

- A underflow in the e1000 jumbo ethernet frame handling could be use by link-local remote attackers to crash the machine or potentially execute code in kernel context.
This requires the attacker to be able to send Jumbo Frames to the target machine. (CVE-2009-4536)

- A underflow in the e1000e jumbo ethernet frame handling could be use by link-local remote attackers to crash the machine or potentially execute code in kernel context.
This requires the attacker to be able to send Jumbo Frames to the target machine. (CVE-2009-4538)

- drivers/firewire/ohci.c in the Linux kernel, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.
(CVE-2009-4138)

- The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and panic) via a malformed ext4 filesystem containing a super block with a large FLEX_BG group size (aka s_log_groups_per_flex value). (CVE-2009-4307)

- The ext4_decode_error function in fs/ext4/super.c in the ext4 filesystem in the Linux kernel before 2.6.32 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference), and possibly have unspecified other impact, via a crafted read-only filesystem that lacks a journal. (CVE-2009-4308)

- The poll_mode_io file for the megaraid_sas driver in the Linux kernel has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file. (CVE-2009-3939)

- The collect_rx_frame function in drivers/isdn/hisax/hfc_usb.c in the Linux kernel allows attackers to have an unspecified impact via a crafted HDLC packet that arrives over ISDN and triggers a buffer under-read. (CVE-2009-4005)

- A negative offset in a ioctl in the GDTH RAID driver was fixed. (CVE-2009-3080)

- Stack-based buffer overflow in the hfs subsystem in the Linux kernel allows remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir function in fs/hfs/dir.c. (CVE-2009-4020)

For a complete list of changes, please look at the RPM changelog.

Solution

Please install the updates provided at the location noted below.

Installation notes

This update is provided as a set of RPM packages that can easily be installed onto a running system by using the YaST online update module.

Solution

Apply SAT patch number 1753.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=479304

https://bugzilla.novell.com/show_bug.cgi?id=480524

https://bugzilla.novell.com/show_bug.cgi?id=490030

https://bugzilla.novell.com/show_bug.cgi?id=509066

https://bugzilla.novell.com/show_bug.cgi?id=515645

https://bugzilla.novell.com/show_bug.cgi?id=523487

https://bugzilla.novell.com/show_bug.cgi?id=526819

https://bugzilla.novell.com/show_bug.cgi?id=528811

https://bugzilla.novell.com/show_bug.cgi?id=535939

https://bugzilla.novell.com/show_bug.cgi?id=544763

https://bugzilla.novell.com/show_bug.cgi?id=545367

https://bugzilla.novell.com/show_bug.cgi?id=546449

https://bugzilla.novell.com/show_bug.cgi?id=547357

https://bugzilla.novell.com/show_bug.cgi?id=547370

https://bugzilla.novell.com/show_bug.cgi?id=547474

https://bugzilla.novell.com/show_bug.cgi?id=549567

https://bugzilla.novell.com/show_bug.cgi?id=552033

https://bugzilla.novell.com/show_bug.cgi?id=554197

https://bugzilla.novell.com/show_bug.cgi?id=557180

https://bugzilla.novell.com/show_bug.cgi?id=557668

https://bugzilla.novell.com/show_bug.cgi?id=557683

https://bugzilla.novell.com/show_bug.cgi?id=560055

https://bugzilla.novell.com/show_bug.cgi?id=561621

https://bugzilla.novell.com/show_bug.cgi?id=564374

https://bugzilla.novell.com/show_bug.cgi?id=564381

https://bugzilla.novell.com/show_bug.cgi?id=564382

https://bugzilla.novell.com/show_bug.cgi?id=564712

https://bugzilla.novell.com/show_bug.cgi?id=565267

https://bugzilla.novell.com/show_bug.cgi?id=566480

https://bugzilla.novell.com/show_bug.cgi?id=567376

https://bugzilla.novell.com/show_bug.cgi?id=567684

http://support.novell.com/security/cve/CVE-2009-3080.html

http://support.novell.com/security/cve/CVE-2009-3939.html

http://support.novell.com/security/cve/CVE-2009-4005.html

http://support.novell.com/security/cve/CVE-2009-4020.html

http://support.novell.com/security/cve/CVE-2009-4138.html

http://support.novell.com/security/cve/CVE-2009-4307.html

http://support.novell.com/security/cve/CVE-2009-4308.html

http://support.novell.com/security/cve/CVE-2009-4536.html

http://support.novell.com/security/cve/CVE-2009-4538.html

Plugin Details

Severity: Critical

ID: 52685

File Name: suse_11_kernel-100109.nasl

Version: 1.12

Type: local

Agent: unix

Published: 3/17/2011

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default, p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:kernel-default-man, p-cpe:/a:novell:suse_linux:11:kernel-source, p-cpe:/a:novell:suse_linux:11:kernel-syms, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 1/9/2010

Reference Information

CVE: CVE-2009-3080, CVE-2009-3939, CVE-2009-4005, CVE-2009-4020, CVE-2009-4138, CVE-2009-4307, CVE-2009-4308, CVE-2009-4536, CVE-2009-4538

CWE: 119, 189, 264, 399