SuSE 11.1 Security Update : Linux kernel (SAT Patch Number 5056)

medium Nessus Plugin ID 57110
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

The SUSE Linux Enterprise 11 Service Pack 1 kernel was updated to 2.6.32.45 and fixes various bugs and security issues.

The following security issues have been fixed :

- Timo Warns reported an issue in the Linux implementation for GUID partitions. Users with physical access could gain access to sensitive kernel memory by adding a storage device with a specially crafted corrupted invalid partition table. (CVE-2011-1776)

- The second part of this fix was not yet applied to our kernel: arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device. (CVE-2010-3881)

- The /proc/PID/io interface could be used by local attackers to gain information on other processes like number of password characters typed or similar.
(CVE-2011-2495)

- A small buffer overflow in the radio driver si4713-i2c was fixed that could potentially used by local attackers to crash the kernel or potentially execute code.
(CVE-2011-2700)

- A kernel information leak in the comedi driver from kernel to userspace was fixed. (CVE-2011-2909)

- In the perf framework software event overflows could deadlock or delete an uninitialized timer.
(CVE-2011-2918)

Solution

Apply SAT patch number 5056.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=225091

https://bugzilla.novell.com/show_bug.cgi?id=602150

https://bugzilla.novell.com/show_bug.cgi?id=635880

https://bugzilla.novell.com/show_bug.cgi?id=649625

https://bugzilla.novell.com/show_bug.cgi?id=663678

https://bugzilla.novell.com/show_bug.cgi?id=685226

https://bugzilla.novell.com/show_bug.cgi?id=692784

https://bugzilla.novell.com/show_bug.cgi?id=693513

https://bugzilla.novell.com/show_bug.cgi?id=694315

https://bugzilla.novell.com/show_bug.cgi?id=699354

https://bugzilla.novell.com/show_bug.cgi?id=699916

https://bugzilla.novell.com/show_bug.cgi?id=701355

https://bugzilla.novell.com/show_bug.cgi?id=703155

https://bugzilla.novell.com/show_bug.cgi?id=703786

https://bugzilla.novell.com/show_bug.cgi?id=704361

https://bugzilla.novell.com/show_bug.cgi?id=704957

https://bugzilla.novell.com/show_bug.cgi?id=705433

https://bugzilla.novell.com/show_bug.cgi?id=705903

https://bugzilla.novell.com/show_bug.cgi?id=706696

https://bugzilla.novell.com/show_bug.cgi?id=707332

https://bugzilla.novell.com/show_bug.cgi?id=707644

https://bugzilla.novell.com/show_bug.cgi?id=708160

https://bugzilla.novell.com/show_bug.cgi?id=708376

https://bugzilla.novell.com/show_bug.cgi?id=708730

https://bugzilla.novell.com/show_bug.cgi?id=710352

https://bugzilla.novell.com/show_bug.cgi?id=711752

https://bugzilla.novell.com/show_bug.cgi?id=711941

https://bugzilla.novell.com/show_bug.cgi?id=712316

https://bugzilla.novell.com/show_bug.cgi?id=712366

http://support.novell.com/security/cve/CVE-2010-3881.html

http://support.novell.com/security/cve/CVE-2011-1776.html

http://support.novell.com/security/cve/CVE-2011-2495.html

http://support.novell.com/security/cve/CVE-2011-2700.html

http://support.novell.com/security/cve/CVE-2011-2909.html

http://support.novell.com/security/cve/CVE-2011-2918.html

Plugin Details

Severity: Medium

ID: 57110

File Name: suse_11_kernel-110824.nasl

Version: 1.6

Type: local

Agent: unix

Published: 12/13/2011

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5.6

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:btrfs-kmp-default, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-pae, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-xen, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-pae, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-default, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-pae, p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:kernel-default-devel, p-cpe:/a:novell:suse_linux:11:kernel-default-extra, p-cpe:/a:novell:suse_linux:11:kernel-desktop-devel, p-cpe:/a:novell:suse_linux:11:kernel-ec2, p-cpe:/a:novell:suse_linux:11:kernel-ec2-base, p-cpe:/a:novell:suse_linux:11:kernel-pae, p-cpe:/a:novell:suse_linux:11:kernel-pae-base, p-cpe:/a:novell:suse_linux:11:kernel-pae-devel, p-cpe:/a:novell:suse_linux:11:kernel-pae-extra, p-cpe:/a:novell:suse_linux:11:kernel-source, p-cpe:/a:novell:suse_linux:11:kernel-syms, p-cpe:/a:novell:suse_linux:11:kernel-trace, p-cpe:/a:novell:suse_linux:11:kernel-trace-base, p-cpe:/a:novell:suse_linux:11:kernel-trace-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen, p-cpe:/a:novell:suse_linux:11:kernel-xen-base, p-cpe:/a:novell:suse_linux:11:kernel-xen-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen-extra, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 8/24/2011

Reference Information

CVE: CVE-2010-3881, CVE-2011-1776, CVE-2011-2495, CVE-2011-2700, CVE-2011-2909, CVE-2011-2918