SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 3068 / 3069 / 3070)

This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.

Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

This SUSE Linux Enterprise 11 Service Pack 1 kernel contains various
security fixes and lots of other bugfixes.

Notable larger bugfixes and changes :

- 603464: Fix system freezewhen doing a network crashdump
with a netxen_nic driver

- 610828: Avoid kernel failure on connects/disconnects to
a novell server with Novell Client 2.0

- 612009: Fix Oracle issues due to problems with OCFS

- 614332: Fix SMB processes stuck in uninteruptible sleep
when using (LVS/ClusteredIP) + CTDB + OCFS2

- 619525: Fix igb driver regression

- 626321: Add patch for Apparent OCFS2 corruption after
removing a bunch of reflinks

- 627518: Avoid System hangs up after failed to copy files
from smb server

- 629552: Skip Tape rewind during boot or a scsi scan The
following security issues were fixed :

- insufficient range checks on the ETHTOOL_GRXCLSRLALL
command allowed local users to at least crash the
kernel. (CVE-2010-2478)

- Specially crafted NFS write requests could crash the
kernel. (CVE-2010-2521)

- a malicious local user could fill the cache used by CIFS
do perform dns lookups with chosen data, therefore
tricking the kernel into mounting a wrong CIFS server.

- a local user could overwrite append-only files on a
btrfs file system. (CVE-2010-2537)

- a local user could read kernel memory of a btrfs file
system. (CVE-2010-2538)

- local users could trigger a NULL derefence via gfs2 file
system. (CVE-2010-2798)

- driver specific drm ioctl could leak kernel memory to
users with access to dri devices. (CVE-2010-2803)

- 'tc dump' could leak some kernel memory. (CVE-2010-2942)

- the 'os2' xaddr namespace could be used to bypass xattr
namespace rules. (CVE-2010-2946)

- integer overflows in the CAN subsystem allowed attackers
to crash the kernel or gain privileges. (CVE-2010-2959)

- certain write operations on an ext4 filesystem could
crash the kernel. (CVE-2010-3015)

See also :

Solution :

Apply SAT patch number 3068 / 3069 / 3070 as appropriate.

Risk factor :

Critical / CVSS Base Score : 10.0
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now