SuSE 11.1 Security Update : Linux kernel (SAT Patch Number 5056)

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

The SUSE Linux Enterprise 11 Service Pack 1 kernel was updated to
2.6.32.45 and fixes various bugs and security issues.

The following security issues have been fixed :

- Timo Warns reported an issue in the Linux implementation
for GUID partitions. Users with physical access could
gain access to sensitive kernel memory by adding a
storage device with a specially crafted corrupted
invalid partition table. (CVE-2011-1776)

- The second part of this fix was not yet applied to our
kernel: arch/x86/kvm/x86.c in the Linux kernel before
2.6.36.2 does not initialize certain structure members,
which allows local users to obtain potentially sensitive
information from kernel stack memory via read operations
on the /dev/kvm device. (CVE-2010-3881)

- The /proc/PID/io interface could be used by local
attackers to gain information on other processes like
number of password characters typed or similar.
(CVE-2011-2495)

- A small buffer overflow in the radio driver si4713-i2c
was fixed that could potentially used by local attackers
to crash the kernel or potentially execute code.
(CVE-2011-2700)

- A kernel information leak in the comedi driver from
kernel to userspace was fixed. (CVE-2011-2909)

- In the perf framework software event overflows could
deadlock or delete an uninitialized timer.
(CVE-2011-2918)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=225091
https://bugzilla.novell.com/show_bug.cgi?id=602150
https://bugzilla.novell.com/show_bug.cgi?id=635880
https://bugzilla.novell.com/show_bug.cgi?id=649625
https://bugzilla.novell.com/show_bug.cgi?id=663678
https://bugzilla.novell.com/show_bug.cgi?id=685226
https://bugzilla.novell.com/show_bug.cgi?id=692784
https://bugzilla.novell.com/show_bug.cgi?id=693513
https://bugzilla.novell.com/show_bug.cgi?id=694315
https://bugzilla.novell.com/show_bug.cgi?id=699354
https://bugzilla.novell.com/show_bug.cgi?id=699916
https://bugzilla.novell.com/show_bug.cgi?id=701355
https://bugzilla.novell.com/show_bug.cgi?id=703155
https://bugzilla.novell.com/show_bug.cgi?id=703786
https://bugzilla.novell.com/show_bug.cgi?id=704361
https://bugzilla.novell.com/show_bug.cgi?id=704957
https://bugzilla.novell.com/show_bug.cgi?id=705433
https://bugzilla.novell.com/show_bug.cgi?id=705903
https://bugzilla.novell.com/show_bug.cgi?id=706696
https://bugzilla.novell.com/show_bug.cgi?id=707332
https://bugzilla.novell.com/show_bug.cgi?id=707644
https://bugzilla.novell.com/show_bug.cgi?id=708160
https://bugzilla.novell.com/show_bug.cgi?id=708376
https://bugzilla.novell.com/show_bug.cgi?id=708730
https://bugzilla.novell.com/show_bug.cgi?id=710352
https://bugzilla.novell.com/show_bug.cgi?id=711752
https://bugzilla.novell.com/show_bug.cgi?id=711941
https://bugzilla.novell.com/show_bug.cgi?id=712316
https://bugzilla.novell.com/show_bug.cgi?id=712366
http://support.novell.com/security/cve/CVE-2010-3881.html
http://support.novell.com/security/cve/CVE-2011-1776.html
http://support.novell.com/security/cve/CVE-2011-2495.html
http://support.novell.com/security/cve/CVE-2011-2700.html
http://support.novell.com/security/cve/CVE-2011-2909.html
http://support.novell.com/security/cve/CVE-2011-2918.html

Solution :

Apply SAT patch number 5056.

Risk factor :

Medium / CVSS Base Score : 5.6
(CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 57110 ()

Bugtraq ID:

CVE ID: CVE-2010-3881
CVE-2011-1776
CVE-2011-2495
CVE-2011-2700
CVE-2011-2909
CVE-2011-2918

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now