SuSE 11.1 Security Update : Linux Kernel (SAT Patch Numbers 2760 / 2763 / 2764)

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

This SUSE Linux Enterprise 11 Service Pack 1 kernel contains various
security fixes and other bugfixes.

Notable larger bug fixes and changes :

- A deadlock in virtual interface handling in XEN
introduced by the last update has been fixed.

- The btrfs file system received backports of lots of
fixes from 2.6.35.

- An OCFS2 data corruption during high load has been
fixed.

- Custom truncation length has been added for
authentication mechanisms in XFRM to enable IPv6
certification. The following security issues have been
fixed :

- Several buffer overflows in the Novell Client novfs
kernel module could be abused by local users to execute
code in kernel space.

- On ext4 file systems, the MOVE_EXT ioctl() can overwrite
append-only files. (CVE-2010-2066)

- A NULL pointer de-reference in the l2tp protocol can
cause an oops, which leads to a denial of service.
(CVE-2010-2495)

- Insufficient permission checking for the setflags
ioctl() in the gfs2 filesystem. (CVE-2010-1641)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=501563
https://bugzilla.novell.com/show_bug.cgi?id=557710
https://bugzilla.novell.com/show_bug.cgi?id=574006
https://bugzilla.novell.com/show_bug.cgi?id=594362
https://bugzilla.novell.com/show_bug.cgi?id=596113
https://bugzilla.novell.com/show_bug.cgi?id=598308
https://bugzilla.novell.com/show_bug.cgi?id=599671
https://bugzilla.novell.com/show_bug.cgi?id=603528
https://bugzilla.novell.com/show_bug.cgi?id=606575
https://bugzilla.novell.com/show_bug.cgi?id=607123
https://bugzilla.novell.com/show_bug.cgi?id=608435
https://bugzilla.novell.com/show_bug.cgi?id=608576
https://bugzilla.novell.com/show_bug.cgi?id=609506
https://bugzilla.novell.com/show_bug.cgi?id=610362
https://bugzilla.novell.com/show_bug.cgi?id=611104
https://bugzilla.novell.com/show_bug.cgi?id=612457
https://bugzilla.novell.com/show_bug.cgi?id=613171
https://bugzilla.novell.com/show_bug.cgi?id=613542
https://bugzilla.novell.com/show_bug.cgi?id=614793
https://bugzilla.novell.com/show_bug.cgi?id=615003
https://bugzilla.novell.com/show_bug.cgi?id=616088
https://bugzilla.novell.com/show_bug.cgi?id=616369
https://bugzilla.novell.com/show_bug.cgi?id=616612
https://bugzilla.novell.com/show_bug.cgi?id=617248
https://bugzilla.novell.com/show_bug.cgi?id=618767
https://bugzilla.novell.com/show_bug.cgi?id=619007
https://bugzilla.novell.com/show_bug.cgi?id=619416
https://bugzilla.novell.com/show_bug.cgi?id=619536
https://bugzilla.novell.com/show_bug.cgi?id=619840
https://bugzilla.novell.com/show_bug.cgi?id=620020
https://bugzilla.novell.com/show_bug.cgi?id=620021
https://bugzilla.novell.com/show_bug.cgi?id=620904
https://bugzilla.novell.com/show_bug.cgi?id=623472
http://support.novell.com/security/cve/CVE-2010-1641.html
http://support.novell.com/security/cve/CVE-2010-2066.html
http://support.novell.com/security/cve/CVE-2010-2495.html

Solution :

Apply SAT patch number 2760 / 2763 / 2764 as appropriate.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 51609 ()

Bugtraq ID:

CVE ID: CVE-2010-1641
CVE-2010-2066
CVE-2010-2495

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now