SuSE 10 Security Update : the debug kernel (ZYPP Patch Number 6778)

critical Nessus Plugin ID 59144
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote SuSE 10 host is missing a security-related patch.

Description

This update fixes various bugs and some security issues in the SUSE Linux Enterprise 10 SP 3 kernel.

The following security issues were fixed :

- drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. (CVE-2009-4536)

- drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets. (CVE-2009-4538)

- Missing CAP_NET_ADMIN checks in the ebtables netfilter code might have allowed local attackers to modify bridge firewall settings. (CVE-2010-0007)

Solution

Apply ZYPP patch number 6778.

See Also

http://support.novell.com/security/cve/CVE-2009-4536.html

http://support.novell.com/security/cve/CVE-2009-4538.html

http://support.novell.com/security/cve/CVE-2010-0007.html

Plugin Details

Severity: Critical

ID: 59144

File Name: suse_kernel-6778.nasl

Version: 1.5

Type: local

Agent: unix

Published: 5/17/2012

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 1/15/2010

Reference Information

CVE: CVE-2009-4536, CVE-2009-4538, CVE-2010-0007

CWE: 189, 264