SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 8518)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.

Synopsis :

The remote SuSE 10 host is missing a security-related patch.

Description :

This Linux kernel update fixes various security issues and bugs in the
SUSE Linux Enterprise 10 SP4 kernel.

The following security issues have been fixed :

- A race condition in ptrace(2) could be used by local
attackers to crash the kernel and/or execute code in
kernel context. (CVE-2013-0871)

- Avoid side channel information leaks from the ptys via
ptmx, which allowed local attackers to guess keypresses.

- Avoid leaving bprm->interp on the stack which might have
leaked information from the kernel to userland
attackers. (CVE-2012-4530)

- The msr_open function in arch/x86/kernel/msr.c in the
Linux kernel allowed local users to bypass intended
capability restrictions by executing a crafted
application as root, as demonstrated by msr32.c.

- The Xen netback functionality in the Linux kernel
allowed guest OS users to cause a denial of service
(loop) by triggering ring pointer corruption.

- The pciback_enable_msi function in the PCI backend
driver (drivers/xen/pciback/conf_space_capability_msi.c)
in Xen for the Linux kernel allowed guest OS users with
PCI device access to cause a denial of service via a
large number of kernel log messages. NOTE: some of these
details are obtained from third-party information.

Also the following non-security bugs have been fixed :

S/390 :

- s390x: tty struct used after free (bnc#809692,

- s390x/kernel: sched_clock() overflow (bnc#799611,

- qeth: set new mac even if old mac is gone

- qeth: set new mac even if old mac is gone (2)

- qeth: fix deadlock between recovery and bonding driver

- dasd: check count address during online setting

- hugetlbfs: add missing TLB invalidation

- s390/kernel: make user-access pagetable walk code huge
page aware (bnc#781485,LTC#85455).


- xen/netback: fix netbk_count_requests().

- xen: properly bound buffer access when parsing

- xen/scsiback/usbback: move cond_resched() invocations to
proper place.

- xen/pciback: properly clean up after calling

- xen: add further backward-compatibility configure

- xen/PCI: suppress bogus warning on old hypervisors.

- xenbus: fix overflow check in xenbus_dev_write().

- xen/x86: do not corrupt %eip when returning from a
signal handler. Other :

- kernel: Restrict clearing TIF_SIGPENDING. (bnc#742111)

- kernel: recalc_sigpending_tsk fixes. (bnc#742111)

- xfs: Do not reclaim new inodes in xfs_sync_inodes().

- jbd: Avoid BUG_ON when checkpoint stalls. (bnc#795335)

- reiserfs: Fix int overflow while calculating free space.

- cifs: clarify the meaning of tcpStatus == CifsGood.

- cifs: do not allow cifs_reconnect to exit with NULL
socket pointer. (bnc#769093)

- cifs: switch to seq_files. (bnc#776370)

- scsi: fix check of PQ and PDT bits for WLUNs.

- hugetlb: preserve hugetlb pte dirty state. (bnc#790236)

- poll: enforce RLIMIT_NOFILE in poll(). (bnc#787272)

- proc: fix ->open less usage due to ->proc_fops flip.

- rpm/ Ignore kabi errors if
%%ignore_kabi_badness is defined. This is used in the
Kernel:* projects in the OBS.

See also :

Solution :

Apply ZYPP patch number 8518.

Risk factor :

Medium / CVSS Base Score : 6.9
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 65959 ()

Bugtraq ID:

CVE ID: CVE-2012-4530

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now