SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 5219 / 5222 / 5223)

Critical Nessus Plugin ID 57111

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 5.9

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

The SUSE Linux Enterprise 11 Service Pack 1 kernel was updated to 2.6.32.46 and fixes various bugs and security issues.

The following security issues have been fixed :

- A signedness issue in CIFS could possibly have lead to to memory corruption, if a malicious server could send crafted replies to the host. (CVE-2011-3191)

- In the fuse filesystem, FUSE_NOTIFY_INVAL_ENTRY did not check the length of the write so the message processing could overrun and result in a BUG_ON() in fuse_copy_fill(). This flaw could be used by local users able to mount FUSE filesystems to crash the system.
(CVE-2011-3353)

- The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel did not validate the length attribute of long symlinks, which allowed local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malformed Be filesystem. (CVE-2011-2928)

Also the following non security bugs have been fixed :

- CONFIG_CGROUP_MEM_RES_CTLR_SWAP enabled

- CONFIG_CGROUP_MEM_RES_CTLR_SWAP_ENABLED disabled by default. Swap accounting can be turned on by swapaccount=1 kernel command line parameter.
(bnc#719450)

- Make swap accounting default behavior configurable (bnc#719450, bnc#650309, fate#310471).

- Added a missing reset for ioc_reset_in_progress in SoftReset in the mtpsas driver. (bnc#711969)

- Add support for the Digi/IBM PCIe 2-port Adapter.
(bnc#708675)

- Always enable MSI-X on 5709. (bnc#707737)

- sched: fix broken SCHED_RESET_ON_FORK handling.
(bnc#708877)

- sched: Fix rt_rq runtime leakage bug. (bnc#707096)

- ACPI: allow passing down C1 information if no other C-states exist.

- KDB: turn off kdb usb support by default. (bnc#694670 / bnc#603804)

- xfs: Added event tracing support.

- xfs: fix xfs_fsblock_t tracing.

- igb: extend maximum frame size to receive VLAN tagged frames. (bnc#688859)

- cfq: Do not allow queue merges for queues that have no process references. (bnc#712929)

- cfq: break apart merged cfqqs if they stop cooperating.
(bnc#712929)

- cfq: calculate the seek_mean per cfq_queue not per cfq_io_context. (bnc#712929)

- cfq: change the meaning of the cfqq_coop flag.
(bnc#712929)

- cfq-iosched: get rid of the coop_preempt flag.
(bnc#712929)

- cfq: merge cooperating cfq_queues. (bnc#712929)

- Fix FDDI and TR config checks in ipv4 arp and LLC.
(bnc#715235)

- writeback: do uninterruptible sleep in balance_dirty_pages(). (bnc#699354 / bnc#699357)

- xfs: fix memory reclaim recursion deadlock on locked inode buffer. (bnc#699355 / bnc#699354)

- xfs: use GFP_NOFS for page cache allocation. (bnc#699355 / bnc#699354)

- virtio-net: init link state correctly. (bnc#714966)

- cpufreq: pcc-cpufreq: sanity check to prevent a NULL pointer dereference. (bnc#709412)

- x86: ucode-amd: Do not warn when no ucode is available for a CPU

- patches.arch/x86_64-unwind-annotations: Refresh.
(bnc#588458)

- patches.suse/stack-unwind: Refresh. (bnc#588458)

- splice: direct_splice_actor() should not use pos in sd.
(bnc#715763)

- qdio: 2nd stage retry on SIGA-W busy conditions (bnc#713138,LTC#74402).

- TTY: pty, fix pty counting. (bnc#711203)

- Avoid deadlock in GFP_IO/GFP_FS allocation. (bnc#632870)

- novfs: fix some DirCache locking issues. (bnc#669378)

- novfs: fix some kmalloc/kfree issues. (bnc#669378)

- novfs: fix off-by-one allocation error. (bnc#669378)

- novfs: unlink directory after unmap. (bnc#649625)

- novfs: last modification time not reliable. (bnc#642896)

- x86 / IO APIC: Reset IRR in clear_IO_APIC_pin().
(bnc#701686, bnc#667386)

- mptfusion : Added check for SILI bit in READ_6 CDB for DATA UNDERRUN ERRATA. (bnc#712456)

- xfs: serialise unaligned direct IOs. (bnc#707125)

- NFS: Ensure that we handle NFS4ERR_STALE_STATEID correctly. (bnc#701443)

- NFSv4: Do not call nfs4_state_mark_reclaim_reboot() from error handlers. (bnc#701443)

- NFSv4: Fix open recovery. (bnc#701443)

- NFSv4.1: Do not call nfs4_schedule_state_recovery() unnecessarily. (bnc#701443)

Solution

Apply SAT patch number 5219 / 5222 / 5223 as appropriate.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=588458

https://bugzilla.novell.com/show_bug.cgi?id=603804

https://bugzilla.novell.com/show_bug.cgi?id=632870

https://bugzilla.novell.com/show_bug.cgi?id=642896

https://bugzilla.novell.com/show_bug.cgi?id=649625

https://bugzilla.novell.com/show_bug.cgi?id=650309

https://bugzilla.novell.com/show_bug.cgi?id=667386

https://bugzilla.novell.com/show_bug.cgi?id=669378

https://bugzilla.novell.com/show_bug.cgi?id=688859

https://bugzilla.novell.com/show_bug.cgi?id=694670

https://bugzilla.novell.com/show_bug.cgi?id=699354

https://bugzilla.novell.com/show_bug.cgi?id=699355

https://bugzilla.novell.com/show_bug.cgi?id=699357

https://bugzilla.novell.com/show_bug.cgi?id=701443

https://bugzilla.novell.com/show_bug.cgi?id=701686

https://bugzilla.novell.com/show_bug.cgi?id=704347

https://bugzilla.novell.com/show_bug.cgi?id=706557

https://bugzilla.novell.com/show_bug.cgi?id=707096

https://bugzilla.novell.com/show_bug.cgi?id=707125

https://bugzilla.novell.com/show_bug.cgi?id=707737

https://bugzilla.novell.com/show_bug.cgi?id=708675

https://bugzilla.novell.com/show_bug.cgi?id=708877

https://bugzilla.novell.com/show_bug.cgi?id=709412

https://bugzilla.novell.com/show_bug.cgi?id=711203

https://bugzilla.novell.com/show_bug.cgi?id=711969

https://bugzilla.novell.com/show_bug.cgi?id=712456

https://bugzilla.novell.com/show_bug.cgi?id=712929

https://bugzilla.novell.com/show_bug.cgi?id=713138

https://bugzilla.novell.com/show_bug.cgi?id=713430

https://bugzilla.novell.com/show_bug.cgi?id=714001

https://bugzilla.novell.com/show_bug.cgi?id=714966

https://bugzilla.novell.com/show_bug.cgi?id=715235

https://bugzilla.novell.com/show_bug.cgi?id=715763

https://bugzilla.novell.com/show_bug.cgi?id=716901

https://bugzilla.novell.com/show_bug.cgi?id=719117

https://bugzilla.novell.com/show_bug.cgi?id=719450

http://support.novell.com/security/cve/CVE-2011-2928.html

http://support.novell.com/security/cve/CVE-2011-3191.html

http://support.novell.com/security/cve/CVE-2011-3353.html

Plugin Details

Severity: Critical

ID: 57111

File Name: suse_11_kernel-110930.nasl

Version: 1.5

Type: local

Agent: unix

Published: 2011/12/13

Updated: 2019/10/25

Dependencies: 12634

Risk Information

Risk Factor: Critical

VPR Score: 5.9

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:btrfs-kmp-default, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-pae, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-xen, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-pae, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-default, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-pae, p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:kernel-default-devel, p-cpe:/a:novell:suse_linux:11:kernel-default-extra, p-cpe:/a:novell:suse_linux:11:kernel-default-man, p-cpe:/a:novell:suse_linux:11:kernel-desktop-devel, p-cpe:/a:novell:suse_linux:11:kernel-ec2, p-cpe:/a:novell:suse_linux:11:kernel-ec2-base, p-cpe:/a:novell:suse_linux:11:kernel-pae, p-cpe:/a:novell:suse_linux:11:kernel-pae-base, p-cpe:/a:novell:suse_linux:11:kernel-pae-devel, p-cpe:/a:novell:suse_linux:11:kernel-pae-extra, p-cpe:/a:novell:suse_linux:11:kernel-source, p-cpe:/a:novell:suse_linux:11:kernel-syms, p-cpe:/a:novell:suse_linux:11:kernel-trace, p-cpe:/a:novell:suse_linux:11:kernel-trace-base, p-cpe:/a:novell:suse_linux:11:kernel-trace-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen, p-cpe:/a:novell:suse_linux:11:kernel-xen-base, p-cpe:/a:novell:suse_linux:11:kernel-xen-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen-extra, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2011/09/30

Reference Information

CVE: CVE-2011-2928, CVE-2011-3191, CVE-2011-3353