This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote SuSE 11 host is missing one or more security updates.
The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix
the following severe security issues :
- The raw_cmd_copyin function in drivers/block/floppy.c in
the Linux kernel through 3.14.3 does not properly handle
error conditions during processing of an FDRAWCMD ioctl
call, which allows local users to trigger kfree
operations and gain privileges by leveraging write
access to a /dev/fd device. (bnc#875798).
- The raw_cmd_copyout function in drivers/block/floppy.c
in the Linux kernel through 3.14.3 does not properly
restrict access to certain pointers during processing of
an FDRAWCMD ioctl call, which allows local users to
obtain sensitive information from kernel heap memory by
leveraging write access to a /dev/fd device.
- The n_tty_write function in drivers/tty/n_tty.c in the
Linux kernel through 3.14.3 does not properly manage tty
driver access in the 'LECHO & !OPOST' case, which
allows local users to cause a denial of service (memory
corruption and system crash) or gain privileges by
triggering a race condition involving read and write
operations with long strings. (bnc#875690).
See also :
Apply SAT patch number 9233 / 9236 / 9237 as appropriate.
Risk factor :
High / CVSS Base Score : 7.2
Public Exploit Available : true