SuSE 11.1 Security Update : Linux kernel (SAT Patch Number 5056)

Medium Nessus Plugin ID 57110

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

The SUSE Linux Enterprise 11 Service Pack 1 kernel was updated to 2.6.32.45 and fixes various bugs and security issues.

The following security issues have been fixed :

- Timo Warns reported an issue in the Linux implementation for GUID partitions. Users with physical access could gain access to sensitive kernel memory by adding a storage device with a specially crafted corrupted invalid partition table. (CVE-2011-1776)

- The second part of this fix was not yet applied to our kernel: arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device. (CVE-2010-3881)

- The /proc/PID/io interface could be used by local attackers to gain information on other processes like number of password characters typed or similar.
(CVE-2011-2495)

- A small buffer overflow in the radio driver si4713-i2c was fixed that could potentially used by local attackers to crash the kernel or potentially execute code.
(CVE-2011-2700)

- A kernel information leak in the comedi driver from kernel to userspace was fixed. (CVE-2011-2909)

- In the perf framework software event overflows could deadlock or delete an uninitialized timer.
(CVE-2011-2918)

Solution

Apply SAT patch number 5056.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=225091

https://bugzilla.novell.com/show_bug.cgi?id=602150

https://bugzilla.novell.com/show_bug.cgi?id=635880

https://bugzilla.novell.com/show_bug.cgi?id=649625

https://bugzilla.novell.com/show_bug.cgi?id=663678

https://bugzilla.novell.com/show_bug.cgi?id=685226

https://bugzilla.novell.com/show_bug.cgi?id=692784

https://bugzilla.novell.com/show_bug.cgi?id=693513

https://bugzilla.novell.com/show_bug.cgi?id=694315

https://bugzilla.novell.com/show_bug.cgi?id=699354

https://bugzilla.novell.com/show_bug.cgi?id=699916

https://bugzilla.novell.com/show_bug.cgi?id=701355

https://bugzilla.novell.com/show_bug.cgi?id=703155

https://bugzilla.novell.com/show_bug.cgi?id=703786

https://bugzilla.novell.com/show_bug.cgi?id=704361

https://bugzilla.novell.com/show_bug.cgi?id=704957

https://bugzilla.novell.com/show_bug.cgi?id=705433

https://bugzilla.novell.com/show_bug.cgi?id=705903

https://bugzilla.novell.com/show_bug.cgi?id=706696

https://bugzilla.novell.com/show_bug.cgi?id=707332

https://bugzilla.novell.com/show_bug.cgi?id=707644

https://bugzilla.novell.com/show_bug.cgi?id=708160

https://bugzilla.novell.com/show_bug.cgi?id=708376

https://bugzilla.novell.com/show_bug.cgi?id=708730

https://bugzilla.novell.com/show_bug.cgi?id=710352

https://bugzilla.novell.com/show_bug.cgi?id=711752

https://bugzilla.novell.com/show_bug.cgi?id=711941

https://bugzilla.novell.com/show_bug.cgi?id=712316

https://bugzilla.novell.com/show_bug.cgi?id=712366

http://support.novell.com/security/cve/CVE-2010-3881.html

http://support.novell.com/security/cve/CVE-2011-1776.html

http://support.novell.com/security/cve/CVE-2011-2495.html

http://support.novell.com/security/cve/CVE-2011-2700.html

http://support.novell.com/security/cve/CVE-2011-2909.html

http://support.novell.com/security/cve/CVE-2011-2918.html

Plugin Details

Severity: Medium

ID: 57110

File Name: suse_11_kernel-110824.nasl

Version: 1.5

Type: local

Agent: unix

Published: 2011/12/13

Updated: 2019/10/25

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:btrfs-kmp-default, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-pae, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-xen, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-pae, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-default, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-pae, p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:kernel-default-devel, p-cpe:/a:novell:suse_linux:11:kernel-default-extra, p-cpe:/a:novell:suse_linux:11:kernel-desktop-devel, p-cpe:/a:novell:suse_linux:11:kernel-ec2, p-cpe:/a:novell:suse_linux:11:kernel-ec2-base, p-cpe:/a:novell:suse_linux:11:kernel-pae, p-cpe:/a:novell:suse_linux:11:kernel-pae-base, p-cpe:/a:novell:suse_linux:11:kernel-pae-devel, p-cpe:/a:novell:suse_linux:11:kernel-pae-extra, p-cpe:/a:novell:suse_linux:11:kernel-source, p-cpe:/a:novell:suse_linux:11:kernel-syms, p-cpe:/a:novell:suse_linux:11:kernel-trace, p-cpe:/a:novell:suse_linux:11:kernel-trace-base, p-cpe:/a:novell:suse_linux:11:kernel-trace-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen, p-cpe:/a:novell:suse_linux:11:kernel-xen-base, p-cpe:/a:novell:suse_linux:11:kernel-xen-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen-extra, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2011/08/24

Reference Information

CVE: CVE-2010-3881, CVE-2011-1776, CVE-2011-2495, CVE-2011-2700, CVE-2011-2909, CVE-2011-2918