SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 5031 / 5055)

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.

Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

The SUSE Linux Enterprise 11 Service Pack 1 kernel was updated to and fixes various bugs and security issues.

The following security issues have been fixed :

- Timo Warns reported an issue in the Linux implementation
for GUID partitions. Users with physical access could
gain access to sensitive kernel memory by adding a
storage device with a specially crafted corrupted
invalid partition table. (CVE-2011-1776)

- The second part of this fix was not yet applied to our
kernel: arch/x86/kvm/x86.c in the Linux kernel before does not initialize certain structure members,
which allows local users to obtain potentially sensitive
information from kernel stack memory via read operations
on the /dev/kvm device. (CVE-2010-3881)

- The /proc/PID/io interface could be used by local
attackers to gain information on other processes like
number of password characters typed or similar.

- A small buffer overflow in the radio driver si4713-i2c
was fixed that could potentially used by local attackers
to crash the kernel or potentially execute code.

- A kernel information leak in the comedi driver from
kernel to userspace was fixed. (CVE-2011-2909)

- In the perf framework software event overflows could
deadlock or delete an uninitialized timer.

See also :

Solution :

Apply SAT patch number 5031 / 5055 as appropriate.

Risk factor :

Medium / CVSS Base Score : 5.6

Family: SuSE Local Security Checks

Nessus Plugin ID: 57109 ()

Bugtraq ID:

CVE ID: CVE-2010-3881

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now