SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 5219 / 5222 / 5223)

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

The SUSE Linux Enterprise 11 Service Pack 1 kernel was updated to
2.6.32.46 and fixes various bugs and security issues.

The following security issues have been fixed :

- A signedness issue in CIFS could possibly have lead to
to memory corruption, if a malicious server could send
crafted replies to the host. (CVE-2011-3191)

- In the fuse filesystem, FUSE_NOTIFY_INVAL_ENTRY did not
check the length of the write so the message processing
could overrun and result in a BUG_ON() in
fuse_copy_fill(). This flaw could be used by local users
able to mount FUSE filesystems to crash the system.
(CVE-2011-3353)

- The befs_follow_link function in fs/befs/linuxvfs.c in
the Linux kernel did not validate the length attribute
of long symlinks, which allowed local users to cause a
denial of service (incorrect pointer dereference and
OOPS) by accessing a long symlink on a malformed Be
filesystem. (CVE-2011-2928)

Also the following non security bugs have been fixed :

- CONFIG_CGROUP_MEM_RES_CTLR_SWAP enabled

- CONFIG_CGROUP_MEM_RES_CTLR_SWAP_ENABLED disabled by
default. Swap accounting can be turned on by
swapaccount=1 kernel command line parameter.
(bnc#719450)

- Make swap accounting default behavior configurable
(bnc#719450, bnc#650309, fate#310471).

- Added a missing reset for ioc_reset_in_progress in
SoftReset in the mtpsas driver. (bnc#711969)

- Add support for the Digi/IBM PCIe 2-port Adapter.
(bnc#708675)

- Always enable MSI-X on 5709. (bnc#707737)

- sched: fix broken SCHED_RESET_ON_FORK handling.
(bnc#708877)

- sched: Fix rt_rq runtime leakage bug. (bnc#707096)

- ACPI: allow passing down C1 information if no other
C-states exist.

- KDB: turn off kdb usb support by default. (bnc#694670 /
bnc#603804)

- xfs: Added event tracing support.

- xfs: fix xfs_fsblock_t tracing.

- igb: extend maximum frame size to receive VLAN tagged
frames. (bnc#688859)

- cfq: Do not allow queue merges for queues that have no
process references. (bnc#712929)

- cfq: break apart merged cfqqs if they stop cooperating.
(bnc#712929)

- cfq: calculate the seek_mean per cfq_queue not per
cfq_io_context. (bnc#712929)

- cfq: change the meaning of the cfqq_coop flag.
(bnc#712929)

- cfq-iosched: get rid of the coop_preempt flag.
(bnc#712929)

- cfq: merge cooperating cfq_queues. (bnc#712929)

- Fix FDDI and TR config checks in ipv4 arp and LLC.
(bnc#715235)

- writeback: do uninterruptible sleep in
balance_dirty_pages(). (bnc#699354 / bnc#699357)

- xfs: fix memory reclaim recursion deadlock on locked
inode buffer. (bnc#699355 / bnc#699354)

- xfs: use GFP_NOFS for page cache allocation. (bnc#699355
/ bnc#699354)

- virtio-net: init link state correctly. (bnc#714966)

- cpufreq: pcc-cpufreq: sanity check to prevent a NULL
pointer dereference. (bnc#709412)

- x86: ucode-amd: Do not warn when no ucode is available
for a CPU

- patches.arch/x86_64-unwind-annotations: Refresh.
(bnc#588458)

- patches.suse/stack-unwind: Refresh. (bnc#588458)

- splice: direct_splice_actor() should not use pos in sd.
(bnc#715763)

- qdio: 2nd stage retry on SIGA-W busy conditions
(bnc#713138,LTC#74402).

- TTY: pty, fix pty counting. (bnc#711203)

- Avoid deadlock in GFP_IO/GFP_FS allocation. (bnc#632870)

- novfs: fix some DirCache locking issues. (bnc#669378)

- novfs: fix some kmalloc/kfree issues. (bnc#669378)

- novfs: fix off-by-one allocation error. (bnc#669378)

- novfs: unlink directory after unmap. (bnc#649625)

- novfs: last modification time not reliable. (bnc#642896)

- x86 / IO APIC: Reset IRR in clear_IO_APIC_pin().
(bnc#701686, bnc#667386)

- mptfusion : Added check for SILI bit in READ_6 CDB for
DATA UNDERRUN ERRATA. (bnc#712456)

- xfs: serialise unaligned direct IOs. (bnc#707125)

- NFS: Ensure that we handle NFS4ERR_STALE_STATEID
correctly. (bnc#701443)

- NFSv4: Do not call nfs4_state_mark_reclaim_reboot() from
error handlers. (bnc#701443)

- NFSv4: Fix open recovery. (bnc#701443)

- NFSv4.1: Do not call nfs4_schedule_state_recovery()
unnecessarily. (bnc#701443)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=588458
https://bugzilla.novell.com/show_bug.cgi?id=603804
https://bugzilla.novell.com/show_bug.cgi?id=632870
https://bugzilla.novell.com/show_bug.cgi?id=642896
https://bugzilla.novell.com/show_bug.cgi?id=649625
https://bugzilla.novell.com/show_bug.cgi?id=650309
https://bugzilla.novell.com/show_bug.cgi?id=667386
https://bugzilla.novell.com/show_bug.cgi?id=669378
https://bugzilla.novell.com/show_bug.cgi?id=688859
https://bugzilla.novell.com/show_bug.cgi?id=694670
https://bugzilla.novell.com/show_bug.cgi?id=699354
https://bugzilla.novell.com/show_bug.cgi?id=699355
https://bugzilla.novell.com/show_bug.cgi?id=699357
https://bugzilla.novell.com/show_bug.cgi?id=701443
https://bugzilla.novell.com/show_bug.cgi?id=701686
https://bugzilla.novell.com/show_bug.cgi?id=704347
https://bugzilla.novell.com/show_bug.cgi?id=706557
https://bugzilla.novell.com/show_bug.cgi?id=707096
https://bugzilla.novell.com/show_bug.cgi?id=707125
https://bugzilla.novell.com/show_bug.cgi?id=707737
https://bugzilla.novell.com/show_bug.cgi?id=708675
https://bugzilla.novell.com/show_bug.cgi?id=708877
https://bugzilla.novell.com/show_bug.cgi?id=709412
https://bugzilla.novell.com/show_bug.cgi?id=711203
https://bugzilla.novell.com/show_bug.cgi?id=711969
https://bugzilla.novell.com/show_bug.cgi?id=712456
https://bugzilla.novell.com/show_bug.cgi?id=712929
https://bugzilla.novell.com/show_bug.cgi?id=713138
https://bugzilla.novell.com/show_bug.cgi?id=713430
https://bugzilla.novell.com/show_bug.cgi?id=714001
https://bugzilla.novell.com/show_bug.cgi?id=714966
https://bugzilla.novell.com/show_bug.cgi?id=715235
https://bugzilla.novell.com/show_bug.cgi?id=715763
https://bugzilla.novell.com/show_bug.cgi?id=716901
https://bugzilla.novell.com/show_bug.cgi?id=719117
https://bugzilla.novell.com/show_bug.cgi?id=719450
http://support.novell.com/security/cve/CVE-2011-2928.html
http://support.novell.com/security/cve/CVE-2011-3191.html
http://support.novell.com/security/cve/CVE-2011-3353.html

Solution :

Apply SAT patch number 5219 / 5222 / 5223 as appropriate.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 57111 ()

Bugtraq ID:

CVE ID: CVE-2011-2928
CVE-2011-3191
CVE-2011-3353

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now