SuSE 11 Security Update : Linux kernel (SAT Patch Numbers 713 / 715 / 716)

medium Nessus Plugin ID 41410

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

This Linux kernel update for SUSE Linux Enterprise 11 fixes lots of bugs and some security issues.

The kernel was also updated to the 2.6.27.21 stable release.

- nfsd in the Linux kernel does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option. (CVE-2009-1072)

- The sock_getsockopt function in net/core/sock.c in the Linux kernel does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request. The fix for this was incomplete. (CVE-2009-0676)

- The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod. (CVE-2009-0835)

Solution

Apply SAT patch number 713 / 715 / 716 as appropriate.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=417417

https://bugzilla.novell.com/show_bug.cgi?id=439348

https://bugzilla.novell.com/show_bug.cgi?id=441420

https://bugzilla.novell.com/show_bug.cgi?id=450468

https://bugzilla.novell.com/show_bug.cgi?id=457472

https://bugzilla.novell.com/show_bug.cgi?id=458222

https://bugzilla.novell.com/show_bug.cgi?id=462913

https://bugzilla.novell.com/show_bug.cgi?id=463829

https://bugzilla.novell.com/show_bug.cgi?id=465854

https://bugzilla.novell.com/show_bug.cgi?id=465955

https://bugzilla.novell.com/show_bug.cgi?id=467174

https://bugzilla.novell.com/show_bug.cgi?id=467317

https://bugzilla.novell.com/show_bug.cgi?id=467381

https://bugzilla.novell.com/show_bug.cgi?id=469576

https://bugzilla.novell.com/show_bug.cgi?id=470238

https://bugzilla.novell.com/show_bug.cgi?id=471249

https://bugzilla.novell.com/show_bug.cgi?id=472783

https://bugzilla.novell.com/show_bug.cgi?id=473881

https://bugzilla.novell.com/show_bug.cgi?id=474335

https://bugzilla.novell.com/show_bug.cgi?id=476330

https://bugzilla.novell.com/show_bug.cgi?id=477624

https://bugzilla.novell.com/show_bug.cgi?id=478534

https://bugzilla.novell.com/show_bug.cgi?id=479558

https://bugzilla.novell.com/show_bug.cgi?id=479617

https://bugzilla.novell.com/show_bug.cgi?id=479730

https://bugzilla.novell.com/show_bug.cgi?id=479784

https://bugzilla.novell.com/show_bug.cgi?id=480391

https://bugzilla.novell.com/show_bug.cgi?id=480448

https://bugzilla.novell.com/show_bug.cgi?id=480524

https://bugzilla.novell.com/show_bug.cgi?id=480617

https://bugzilla.novell.com/show_bug.cgi?id=480749

https://bugzilla.novell.com/show_bug.cgi?id=480753

https://bugzilla.novell.com/show_bug.cgi?id=480809

https://bugzilla.novell.com/show_bug.cgi?id=481749

https://bugzilla.novell.com/show_bug.cgi?id=482052

https://bugzilla.novell.com/show_bug.cgi?id=482220

https://bugzilla.novell.com/show_bug.cgi?id=482506

https://bugzilla.novell.com/show_bug.cgi?id=482614

https://bugzilla.novell.com/show_bug.cgi?id=482796

https://bugzilla.novell.com/show_bug.cgi?id=482818

https://bugzilla.novell.com/show_bug.cgi?id=483706

https://bugzilla.novell.com/show_bug.cgi?id=484529

https://bugzilla.novell.com/show_bug.cgi?id=484664

https://bugzilla.novell.com/show_bug.cgi?id=484767

https://bugzilla.novell.com/show_bug.cgi?id=485089

https://bugzilla.novell.com/show_bug.cgi?id=486001

https://bugzilla.novell.com/show_bug.cgi?id=486331

https://bugzilla.novell.com/show_bug.cgi?id=486728

https://bugzilla.novell.com/show_bug.cgi?id=487247

https://bugzilla.novell.com/show_bug.cgi?id=490517

http://support.novell.com/security/cve/CVE-2009-0676.html

http://support.novell.com/security/cve/CVE-2009-0835.html

http://support.novell.com/security/cve/CVE-2009-1072.html

Plugin Details

Severity: Medium

ID: 41410

File Name: suse_11_kernel-090402.nasl

Version: 1.12

Type: local

Agent: unix

Published: 9/24/2009

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.5

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:C/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:kernel-vmi, p-cpe:/a:novell:suse_linux:11:kernel-syms, p-cpe:/a:novell:suse_linux:11:kernel-default-extra, p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-xen-extra, p-cpe:/a:novell:suse_linux:11:kernel-source, p-cpe:/a:novell:suse_linux:11:kernel-pae-base, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:11:kernel-xen, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-pae, p-cpe:/a:novell:suse_linux:11:kernel-vmi-base, p-cpe:/a:novell:suse_linux:11:kernel-pae, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:kernel-default-man, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-vmi, p-cpe:/a:novell:suse_linux:11:kernel-xen-base, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen, p-cpe:/a:novell:suse_linux:11:kernel-pae-extra

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 4/2/2009

Reference Information

CVE: CVE-2009-0676, CVE-2009-0835, CVE-2009-1072

CWE: 16, 264