SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 3276 / 3280 / 3284)

This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

This SUSE Linux Enterprise 11 Service Pack 1 kernel contains various
security fixes and lots of other bugfixes.

The following security issues were fixed :

- local users could crash the system by causing a NULL
deref in the keyctl_session_to_parent() function.
(CVE-2010-2960)

- local users could crash the system by causing a NULL
deref via IRDA sockets. (CVE-2010-2954)

- local users could crash the system by causing a NULL
deref in ftrace. (CVE-2010-3079)

- several kernel functions could leak kernel stack memory
contents. (CVE-2010-3078 / CVE-2010-3297 / CVE-2010-3298
/ CVE-2010-3081 / CVE-2010-3296)

- local users could cause dereference of an uninitialized
pointer via /dev/sequencer. (CVE-2010-3080)

- local users could corrupt kernel heap memory via ROSE
sockets. (CVE-2010-3310)

- local users could write to any kernel memory location
via the i915 GEM ioctl interface Additionally this
update restores the compat_alloc_userspace() inline
function. (CVE-2010-2962)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=582730
https://bugzilla.novell.com/show_bug.cgi?id=596646
https://bugzilla.novell.com/show_bug.cgi?id=600043
https://bugzilla.novell.com/show_bug.cgi?id=601520
https://bugzilla.novell.com/show_bug.cgi?id=613330
https://bugzilla.novell.com/show_bug.cgi?id=614226
https://bugzilla.novell.com/show_bug.cgi?id=616080
https://bugzilla.novell.com/show_bug.cgi?id=618059
https://bugzilla.novell.com/show_bug.cgi?id=618072
https://bugzilla.novell.com/show_bug.cgi?id=618379
https://bugzilla.novell.com/show_bug.cgi?id=620443
https://bugzilla.novell.com/show_bug.cgi?id=620654
https://bugzilla.novell.com/show_bug.cgi?id=624020
https://bugzilla.novell.com/show_bug.cgi?id=624814
https://bugzilla.novell.com/show_bug.cgi?id=625674
https://bugzilla.novell.com/show_bug.cgi?id=626880
https://bugzilla.novell.com/show_bug.cgi?id=629170
https://bugzilla.novell.com/show_bug.cgi?id=632568
https://bugzilla.novell.com/show_bug.cgi?id=633268
https://bugzilla.novell.com/show_bug.cgi?id=633543
https://bugzilla.novell.com/show_bug.cgi?id=633593
https://bugzilla.novell.com/show_bug.cgi?id=633733
https://bugzilla.novell.com/show_bug.cgi?id=634637
https://bugzilla.novell.com/show_bug.cgi?id=635425
https://bugzilla.novell.com/show_bug.cgi?id=636112
https://bugzilla.novell.com/show_bug.cgi?id=636461
https://bugzilla.novell.com/show_bug.cgi?id=636561
https://bugzilla.novell.com/show_bug.cgi?id=636850
https://bugzilla.novell.com/show_bug.cgi?id=637436
https://bugzilla.novell.com/show_bug.cgi?id=637502
https://bugzilla.novell.com/show_bug.cgi?id=637639
https://bugzilla.novell.com/show_bug.cgi?id=637944
https://bugzilla.novell.com/show_bug.cgi?id=638277
https://bugzilla.novell.com/show_bug.cgi?id=638400
https://bugzilla.novell.com/show_bug.cgi?id=638613
https://bugzilla.novell.com/show_bug.cgi?id=638618
https://bugzilla.novell.com/show_bug.cgi?id=638807
https://bugzilla.novell.com/show_bug.cgi?id=638860
https://bugzilla.novell.com/show_bug.cgi?id=639161
https://bugzilla.novell.com/show_bug.cgi?id=639197
https://bugzilla.novell.com/show_bug.cgi?id=639481
https://bugzilla.novell.com/show_bug.cgi?id=639482
https://bugzilla.novell.com/show_bug.cgi?id=639483
https://bugzilla.novell.com/show_bug.cgi?id=639709
https://bugzilla.novell.com/show_bug.cgi?id=639728
https://bugzilla.novell.com/show_bug.cgi?id=639944
https://bugzilla.novell.com/show_bug.cgi?id=640276
https://bugzilla.novell.com/show_bug.cgi?id=640721
https://bugzilla.novell.com/show_bug.cgi?id=641247
https://bugzilla.novell.com/show_bug.cgi?id=642009
https://bugzilla.novell.com/show_bug.cgi?id=642449
https://bugzilla.novell.com/show_bug.cgi?id=643909
https://bugzilla.novell.com/show_bug.cgi?id=643914
https://bugzilla.novell.com/show_bug.cgi?id=643922
http://support.novell.com/security/cve/CVE-2010-2954.html
http://support.novell.com/security/cve/CVE-2010-2960.html
http://support.novell.com/security/cve/CVE-2010-2962.html
http://support.novell.com/security/cve/CVE-2010-3078.html
http://support.novell.com/security/cve/CVE-2010-3079.html
http://support.novell.com/security/cve/CVE-2010-3080.html
http://support.novell.com/security/cve/CVE-2010-3081.html
http://support.novell.com/security/cve/CVE-2010-3296.html
http://support.novell.com/security/cve/CVE-2010-3297.html
http://support.novell.com/security/cve/CVE-2010-3298.html
http://support.novell.com/security/cve/CVE-2010-3310.html

Solution :

Apply SAT patch number 3276 / 3280 / 3284 as appropriate.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now