SuSE9 Security Update : the Linux kernel (YOU Patch Number 12646)

High Nessus Plugin ID 49657


The remote SuSE 9 host is missing a security-related patch.


This updates the SUSE Linux Enterprise Server 9 kernel to fix various security issues and some bugs.

The following security bugs were fixed :

- Incorrect buffer handling in the biarch-compat buffer handling could be used by local attackers to gain root privileges. This problem affects foremost x86_64, or potentially other biarch platforms, like PowerPC and S390x. (CVE-2010-3081)

- A kernel information leak via the WEXT ioctl was fixed.

- A kernel information leak via the XFS filesystem was fixed. (CVE-2010-3078)

- A kernel information leak in the net eql code was fixed.

- The xfs_swapext function in fs/xfs/xfs_dfrag.c in the Linux kernel did not properly check the file descriptors passed to the SWAPEXT ioctl, which allowed local users to leverage write access and obtain read access by swapping one file into another file. (CVE-2010-2226)

- Fixed a kernel information leak in the net scheduler code. (CVE-2010-2942)

- fs/cifs/cifssmb.c in the CIFS implementation in the Linux kernel allowed remote attackers to cause a denial of service (panic) via an SMB response packet with an invalid CountHigh value, as demonstrated by a response from an OS/2 server, related to the CIFSSMBWrite and CIFSSMBWrite2 functions. (CVE-2010-2248)

Additionally a data corruption bug in s390 was fixed :

- A race between /proc/pid/stat and fork in the S390 kernel could lead to data corruption.


Apply YOU patch number 12646.

See Also

Plugin Details

Severity: High

ID: 49657

File Name: suse9_12646.nasl

Version: $Revision: 1.9 $

Type: local

Agent: unix

Published: 2010/09/23

Modified: 2015/01/15

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/09/21

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-2226, CVE-2010-2248, CVE-2010-2942, CVE-2010-2955, CVE-2010-3078, CVE-2010-3081, CVE-2010-3297