SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 3276 / 3280 / 3284)

High Nessus Plugin ID 51612

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 8.9

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

This SUSE Linux Enterprise 11 Service Pack 1 kernel contains various security fixes and lots of other bugfixes.

The following security issues were fixed :

- local users could crash the system by causing a NULL deref in the keyctl_session_to_parent() function.
(CVE-2010-2960)

- local users could crash the system by causing a NULL deref via IRDA sockets. (CVE-2010-2954)

- local users could crash the system by causing a NULL deref in ftrace. (CVE-2010-3079)

- several kernel functions could leak kernel stack memory contents. (CVE-2010-3078 / CVE-2010-3297 / CVE-2010-3298 / CVE-2010-3081 / CVE-2010-3296)

- local users could cause dereference of an uninitialized pointer via /dev/sequencer. (CVE-2010-3080)

- local users could corrupt kernel heap memory via ROSE sockets. (CVE-2010-3310)

- local users could write to any kernel memory location via the i915 GEM ioctl interface Additionally this update restores the compat_alloc_userspace() inline function. (CVE-2010-2962)

Solution

Apply SAT patch number 3276 / 3280 / 3284 as appropriate.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=582730

https://bugzilla.novell.com/show_bug.cgi?id=596646

https://bugzilla.novell.com/show_bug.cgi?id=600043

https://bugzilla.novell.com/show_bug.cgi?id=601520

https://bugzilla.novell.com/show_bug.cgi?id=613330

https://bugzilla.novell.com/show_bug.cgi?id=614226

https://bugzilla.novell.com/show_bug.cgi?id=616080

https://bugzilla.novell.com/show_bug.cgi?id=618059

https://bugzilla.novell.com/show_bug.cgi?id=618072

https://bugzilla.novell.com/show_bug.cgi?id=618379

https://bugzilla.novell.com/show_bug.cgi?id=620443

https://bugzilla.novell.com/show_bug.cgi?id=620654

https://bugzilla.novell.com/show_bug.cgi?id=624020

https://bugzilla.novell.com/show_bug.cgi?id=624814

https://bugzilla.novell.com/show_bug.cgi?id=625674

https://bugzilla.novell.com/show_bug.cgi?id=626880

https://bugzilla.novell.com/show_bug.cgi?id=629170

https://bugzilla.novell.com/show_bug.cgi?id=632568

https://bugzilla.novell.com/show_bug.cgi?id=633268

https://bugzilla.novell.com/show_bug.cgi?id=633543

https://bugzilla.novell.com/show_bug.cgi?id=633593

https://bugzilla.novell.com/show_bug.cgi?id=633733

https://bugzilla.novell.com/show_bug.cgi?id=634637

https://bugzilla.novell.com/show_bug.cgi?id=635425

https://bugzilla.novell.com/show_bug.cgi?id=636112

https://bugzilla.novell.com/show_bug.cgi?id=636461

https://bugzilla.novell.com/show_bug.cgi?id=636561

https://bugzilla.novell.com/show_bug.cgi?id=636850

https://bugzilla.novell.com/show_bug.cgi?id=637436

https://bugzilla.novell.com/show_bug.cgi?id=637502

https://bugzilla.novell.com/show_bug.cgi?id=637639

https://bugzilla.novell.com/show_bug.cgi?id=637944

https://bugzilla.novell.com/show_bug.cgi?id=638277

https://bugzilla.novell.com/show_bug.cgi?id=638400

https://bugzilla.novell.com/show_bug.cgi?id=638613

https://bugzilla.novell.com/show_bug.cgi?id=638618

https://bugzilla.novell.com/show_bug.cgi?id=638807

https://bugzilla.novell.com/show_bug.cgi?id=638860

https://bugzilla.novell.com/show_bug.cgi?id=639161

https://bugzilla.novell.com/show_bug.cgi?id=639197

https://bugzilla.novell.com/show_bug.cgi?id=639481

https://bugzilla.novell.com/show_bug.cgi?id=639482

https://bugzilla.novell.com/show_bug.cgi?id=639483

https://bugzilla.novell.com/show_bug.cgi?id=639709

https://bugzilla.novell.com/show_bug.cgi?id=639728

https://bugzilla.novell.com/show_bug.cgi?id=639944

https://bugzilla.novell.com/show_bug.cgi?id=640276

https://bugzilla.novell.com/show_bug.cgi?id=640721

https://bugzilla.novell.com/show_bug.cgi?id=641247

https://bugzilla.novell.com/show_bug.cgi?id=642009

https://bugzilla.novell.com/show_bug.cgi?id=642449

https://bugzilla.novell.com/show_bug.cgi?id=643909

https://bugzilla.novell.com/show_bug.cgi?id=643914

https://bugzilla.novell.com/show_bug.cgi?id=643922

http://support.novell.com/security/cve/CVE-2010-2954.html

http://support.novell.com/security/cve/CVE-2010-2960.html

http://support.novell.com/security/cve/CVE-2010-2962.html

http://support.novell.com/security/cve/CVE-2010-3078.html

http://support.novell.com/security/cve/CVE-2010-3079.html

http://support.novell.com/security/cve/CVE-2010-3080.html

http://support.novell.com/security/cve/CVE-2010-3081.html

http://support.novell.com/security/cve/CVE-2010-3296.html

http://support.novell.com/security/cve/CVE-2010-3297.html

http://support.novell.com/security/cve/CVE-2010-3298.html

http://support.novell.com/security/cve/CVE-2010-3310.html

Plugin Details

Severity: High

ID: 51612

File Name: suse_11_kernel-101007.nasl

Version: 1.15

Type: local

Agent: unix

Published: 2011/01/21

Updated: 2019/10/25

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 8.9

CVSS v2.0

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:btrfs-kmp-default, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-pae, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-xen, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-pae, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-default, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-pae, p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:kernel-default-devel, p-cpe:/a:novell:suse_linux:11:kernel-default-extra, p-cpe:/a:novell:suse_linux:11:kernel-default-man, p-cpe:/a:novell:suse_linux:11:kernel-desktop-devel, p-cpe:/a:novell:suse_linux:11:kernel-pae, p-cpe:/a:novell:suse_linux:11:kernel-pae-base, p-cpe:/a:novell:suse_linux:11:kernel-pae-devel, p-cpe:/a:novell:suse_linux:11:kernel-pae-extra, p-cpe:/a:novell:suse_linux:11:kernel-source, p-cpe:/a:novell:suse_linux:11:kernel-syms, p-cpe:/a:novell:suse_linux:11:kernel-trace, p-cpe:/a:novell:suse_linux:11:kernel-trace-base, p-cpe:/a:novell:suse_linux:11:kernel-trace-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen, p-cpe:/a:novell:suse_linux:11:kernel-xen-base, p-cpe:/a:novell:suse_linux:11:kernel-xen-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen-extra, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/10/07

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-2954, CVE-2010-2960, CVE-2010-2962, CVE-2010-3078, CVE-2010-3079, CVE-2010-3080, CVE-2010-3081, CVE-2010-3296, CVE-2010-3297, CVE-2010-3298, CVE-2010-3310