SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 5031 / 5055)

medium Nessus Plugin ID 57109

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

The SUSE Linux Enterprise 11 Service Pack 1 kernel was updated to 2.6.32.45 and fixes various bugs and security issues.

The following security issues have been fixed :

- Timo Warns reported an issue in the Linux implementation for GUID partitions. Users with physical access could gain access to sensitive kernel memory by adding a storage device with a specially crafted corrupted invalid partition table. (CVE-2011-1776)

- The second part of this fix was not yet applied to our kernel: arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device. (CVE-2010-3881)

- The /proc/PID/io interface could be used by local attackers to gain information on other processes like number of password characters typed or similar.
(CVE-2011-2495)

- A small buffer overflow in the radio driver si4713-i2c was fixed that could potentially used by local attackers to crash the kernel or potentially execute code.
(CVE-2011-2700)

- A kernel information leak in the comedi driver from kernel to userspace was fixed. (CVE-2011-2909)

- In the perf framework software event overflows could deadlock or delete an uninitialized timer.
(CVE-2011-2918)

Solution

Apply SAT patch number 5031 / 5055 as appropriate.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=225091

https://bugzilla.novell.com/show_bug.cgi?id=602150

https://bugzilla.novell.com/show_bug.cgi?id=635880

https://bugzilla.novell.com/show_bug.cgi?id=649625

https://bugzilla.novell.com/show_bug.cgi?id=663678

https://bugzilla.novell.com/show_bug.cgi?id=685226

https://bugzilla.novell.com/show_bug.cgi?id=692784

https://bugzilla.novell.com/show_bug.cgi?id=693513

https://bugzilla.novell.com/show_bug.cgi?id=694315

https://bugzilla.novell.com/show_bug.cgi?id=699354

https://bugzilla.novell.com/show_bug.cgi?id=699916

https://bugzilla.novell.com/show_bug.cgi?id=701355

https://bugzilla.novell.com/show_bug.cgi?id=703155

https://bugzilla.novell.com/show_bug.cgi?id=703786

https://bugzilla.novell.com/show_bug.cgi?id=704361

https://bugzilla.novell.com/show_bug.cgi?id=704957

https://bugzilla.novell.com/show_bug.cgi?id=705433

https://bugzilla.novell.com/show_bug.cgi?id=705903

https://bugzilla.novell.com/show_bug.cgi?id=706696

https://bugzilla.novell.com/show_bug.cgi?id=707332

https://bugzilla.novell.com/show_bug.cgi?id=707644

https://bugzilla.novell.com/show_bug.cgi?id=708160

https://bugzilla.novell.com/show_bug.cgi?id=708376

https://bugzilla.novell.com/show_bug.cgi?id=708730

https://bugzilla.novell.com/show_bug.cgi?id=710352

https://bugzilla.novell.com/show_bug.cgi?id=711752

https://bugzilla.novell.com/show_bug.cgi?id=711941

https://bugzilla.novell.com/show_bug.cgi?id=712316

https://bugzilla.novell.com/show_bug.cgi?id=712366

http://support.novell.com/security/cve/CVE-2010-3881.html

http://support.novell.com/security/cve/CVE-2011-1776.html

http://support.novell.com/security/cve/CVE-2011-2495.html

http://support.novell.com/security/cve/CVE-2011-2700.html

http://support.novell.com/security/cve/CVE-2011-2909.html

http://support.novell.com/security/cve/CVE-2011-2918.html

Plugin Details

Severity: Medium

ID: 57109

File Name: suse_11_kernel-110823.nasl

Version: 1.6

Type: local

Agent: unix

Published: 12/13/2011

Updated: 1/19/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:btrfs-kmp-default, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-xen, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-default, p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:kernel-default-devel, p-cpe:/a:novell:suse_linux:11:kernel-default-extra, p-cpe:/a:novell:suse_linux:11:kernel-default-man, p-cpe:/a:novell:suse_linux:11:kernel-desktop-devel, p-cpe:/a:novell:suse_linux:11:kernel-ec2, p-cpe:/a:novell:suse_linux:11:kernel-ec2-base, p-cpe:/a:novell:suse_linux:11:kernel-source, p-cpe:/a:novell:suse_linux:11:kernel-syms, p-cpe:/a:novell:suse_linux:11:kernel-trace, p-cpe:/a:novell:suse_linux:11:kernel-trace-base, p-cpe:/a:novell:suse_linux:11:kernel-trace-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen, p-cpe:/a:novell:suse_linux:11:kernel-xen-base, p-cpe:/a:novell:suse_linux:11:kernel-xen-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen-extra, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 8/23/2011

Reference Information

CVE: CVE-2010-3881, CVE-2011-1776, CVE-2011-2495, CVE-2011-2700, CVE-2011-2909, CVE-2011-2918