SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 6547 / 6548 / 6550)

High Nessus Plugin ID 64177


The remote SuSE 11 host is missing one or more security updates.


The SUSE Linux Enterprise 11 SP1 kernel have been updated to fix various bugs and security issues.

The following security issues have been fixed :

- Several buffer overread and overwrite errors in the UDF logical volume descriptor code were fixed that might have allowed local attackers able to mount UDF volumes to crash the kernel or potentially gain privileges.

- A local denial of service in the last epoll fix was fixed. (CVE-2012-3375)

- A integer overflow in i915_gem_do_execbuffer() was fixed that might be used by local attackers to crash the kernel or potentially execute code. (CVE-2012-2384)

- A integer overflow in i915_gem_execbuffer2() was fixed that might be used by local attackers to crash the kernel or potentially execute code. (CVE-2012-2383)

- Memiory leaks in the hugetlbfs map reservation code were fixed that could be used by local attackers to exhaust machine memory. (CVE-2012-2390)

- The filesystem capability handling was not fully correct, allowing local users to bypass fscaps related restrictions to disable e.g. address space randomization. (CVE-2012-2123)

- Validation of data_len before allocating fragments of skbs was fixed that might have allowed a heap overflow.

- Fixed potential buffer overflows in the hfsplus filesystem, which might be exploited by local attackers able to mount such filesystems. (CVE-2012-2319)

Several leapsecond related bug fixes have been created :

- hrtimer: provide clock_was_set_delayed(). (bnc#768632)

- time: Fix leapsecond triggered hrtimer/futex load spike issue. (bnc#768632)

- ntp: fix leap second hrtimer deadlock. (bnc#768632)

- ntp: avoid printk under xtime_lock (bnc#767684). The following non-security issues have been fixed :

- tcp: drop SYN+FIN messages to avoid memory leaks.

- be2net: Fix EEH error reset before a flash dump completes. (bnc#755546)

- REVERT svcrpc: destroy server sockets all at once.

- sched: Make sure to not re-read variables after validation. (bnc#769685)

- audit: Do not send uninitialized data for AUDIT_TTY_GET.

- dlm: do not depend on sctp. (bnc#729247, bnc#763656)

- RPC: killing RPC tasks races fixed. (bnc#765548)

- vlan/core: Fix memory leak/corruption on VLAN GRO_DROP.

- CPU hotplug, cpusets, suspend/resume: Do not modify cpusets during suspend/resume. (bnc#752858)

- ioat2: kill pending flag. (bnc#765022)

- Fix massive driver induced spin_lock_bh() contention.

- ipmi: Fix IPMI errors due to timing problems.

- xen: fix VM_FOREIGN users after c/s 878:eba6fe6d8d53.

- xen: gntdev: fix multi-page slot allocation.

- rpm/ Own the right -kdump initrd.

- kernel: pfault task state race (bnc#764098,LTC#81724).

- xfrm: take net hdr len into account for esp payload size calculation. (bnc#759545)

- bonding: do not dereference NULL pointer to device of VLAN 0. (bnc#763830)

- cifs: fix oops while traversing open file list (try #4).

- nfsd: fix BUG at fs/nfsd/nfsfh.h:199 on unlink.

- nfs: Ensure we never try to mount an NFS auto-mount dir (bnc748601).

- patches.suse/cgroup-disable-memcg-when-low-lowmem.patch:
fix typo: use if defined(CONFIG_) rather than if CONFIG_

- patches.suse/pagecache-limit-fix-shmem-deadlock.patch:
Fixed the GFP_NOWAIT is zero and not suitable for tests bug. (bnc#755537)

- sys_poll: fix incorrect type for timeout parameter.

- scsi_transport_fc: fix blocked bsg request when fc object deleted. (bnc#761414, bnc#734300)

- ehea: fix allmulticast support. (bnc#758013)

- scsi: Silence unnecessary warnings about ioctl to partition. (bnc#758104)

- sched/x86: Fix overflow in cyc2ns_offset. (bnc#630970, bnc#661605)

- sched/rt: Do not throttle when PI boosting. (bnc#754085)

- sched/rt: Keep period timer ticking when rt throttling is active. (bnc#754085)

- sched,rt: fix isolated CPUs leaving root_task_group indefinitely throttled. (bnc#754085)


Apply SAT patch number 6547 / 6548 / 6550 as appropriate.

See Also

Plugin Details

Severity: High

ID: 64177

File Name: suse_11_kernel-120714.nasl

Version: $Revision: 1.4 $

Type: local

Agent: unix

Published: 2013/01/25

Modified: 2014/09/11

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:btrfs-kmp-default, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-pae, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-xen, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-pae, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-trace, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-default, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-pae, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-trace, p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:kernel-default-devel, p-cpe:/a:novell:suse_linux:11:kernel-default-extra, p-cpe:/a:novell:suse_linux:11:kernel-default-man, p-cpe:/a:novell:suse_linux:11:kernel-desktop-devel, p-cpe:/a:novell:suse_linux:11:kernel-ec2, p-cpe:/a:novell:suse_linux:11:kernel-ec2-base, p-cpe:/a:novell:suse_linux:11:kernel-ec2-devel, p-cpe:/a:novell:suse_linux:11:kernel-pae, p-cpe:/a:novell:suse_linux:11:kernel-pae-base, p-cpe:/a:novell:suse_linux:11:kernel-pae-devel, p-cpe:/a:novell:suse_linux:11:kernel-pae-extra, p-cpe:/a:novell:suse_linux:11:kernel-source, p-cpe:/a:novell:suse_linux:11:kernel-syms, p-cpe:/a:novell:suse_linux:11:kernel-trace, p-cpe:/a:novell:suse_linux:11:kernel-trace-base, p-cpe:/a:novell:suse_linux:11:kernel-trace-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen, p-cpe:/a:novell:suse_linux:11:kernel-xen-base, p-cpe:/a:novell:suse_linux:11:kernel-xen-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen-extra, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2012/07/14

Reference Information

CVE: CVE-2012-2123, CVE-2012-2136, CVE-2012-2319, CVE-2012-2383, CVE-2012-2384, CVE-2012-2390, CVE-2012-2663, CVE-2012-3375, CVE-2012-3400