SUSE SLED10 / SLES10 Security Update : kernel (SUSE-SU-2013:0856-1)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

The SUSE Linux Enterprise 10 SP4 kernel has been updated to fix
various bugs and security issues.

Security issues fixed :

CVE-2012-4444: The ip6_frag_queue function in net/ipv6/reassembly.c in
the Linux kernel allowed remote attackers to bypass intended network
restrictions via overlapping IPv6 fragments.

CVE-2013-1928: The do_video_set_spu_palette function in
fs/compat_ioctl.c in the Linux kernel lacked a certain error
check, which might have allowed local users to obtain
sensitive information from kernel stack memory via a crafted
VIDEO_SET_SPU_PALETTE ioctl call on a /dev/dvb device.

Also the following bugs have been fixed :

- hugetlb: Fix regression introduced by the original patch
(bnc#790236, bnc#819403).

- NFSv3/v2: Fix data corruption with NFS short reads
(bnc#818337).

- Fix package descriptions in specfiles (bnc#817666).

- TTY: fix atime/mtime regression (bnc#815745).

- virtio_net: ensure big packets are 64k (bnc#760753).

- virtio_net: refill rx buffers when oom occurs
(bnc#760753).

- qeth: fix qeth_wait_for_threads() deadlock for OSN
devices (bnc#812317, LTC#90910).

- nfsd: remove unnecessary NULL checks from nfsd_cross_mnt
(bnc#810628).

- knfsd: Fixed problem with NFS exporting directories
which are mounted on (bnc#810628).

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.nessus.org/u?076f03bf
http://www.nessus.org/u?3349e6ff
http://www.nessus.org/u?d7706f28
http://www.nessus.org/u?db84cd39
http://www.nessus.org/u?d5333171
http://support.novell.com/security/cve/CVE-2012-4444.html
http://support.novell.com/security/cve/CVE-2013-1928.html
https://bugzilla.novell.com/760753
https://bugzilla.novell.com/789831
https://bugzilla.novell.com/790236
https://bugzilla.novell.com/810628
https://bugzilla.novell.com/812317
https://bugzilla.novell.com/813735
https://bugzilla.novell.com/815745
https://bugzilla.novell.com/817666
https://bugzilla.novell.com/818337
https://bugzilla.novell.com/819403
http://www.nessus.org/u?12ad4baa

Solution :

Update the affected kernel packages

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 83586 ()

Bugtraq ID: 56891
58906

CVE ID: CVE-2012-4444
CVE-2013-1928

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now