SuSE 11 / 11.1 Security Update : Linux kernel (SAT Patch Numbers 3144 / 3147 / 3148 / 3163 / 3171)

high Nessus Plugin ID 50924

Language:

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

This security update of the SUSE Linux Enterprise 11 GA kernel fixes 3 critical security issues.

Following security bugs were fixed :

- Mismatch between 32bit and 64bit register usage in the system call entry path could be used by local attackers to gain root privileges. This problem only affects x86_64 kernels. (CVE-2010-3301)

- Incorrect buffer handling in the biarch-compat buffer handling could be used by local attackers to gain root privileges. This problem affects foremost x86_64, or potentially other biarch platforms, like PowerPC and S390x. (CVE-2010-3081)

- Integer overflow in net/can/bcm.c in the Controller Area Network (CAN) implementation in the Linux kernel allowed attackers to execute arbitrary code or cause a denial of service (system crash) via crafted CAN traffic.
(CVE-2010-2959)

Solution

Apply SAT patch number 3144 / 3147 / 3148 / 3163 / 3171 as appropriate.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=631075

https://bugzilla.novell.com/show_bug.cgi?id=633581

https://bugzilla.novell.com/show_bug.cgi?id=635413

https://bugzilla.novell.com/show_bug.cgi?id=635515

https://bugzilla.novell.com/show_bug.cgi?id=638274

https://bugzilla.novell.com/show_bug.cgi?id=639708

https://bugzilla.novell.com/show_bug.cgi?id=639709

http://support.novell.com/security/cve/CVE-2010-2955.html

http://support.novell.com/security/cve/CVE-2010-2959.html

http://support.novell.com/security/cve/CVE-2010-3081.html

http://support.novell.com/security/cve/CVE-2010-3084.html

http://support.novell.com/security/cve/CVE-2010-3301.html

Plugin Details

Severity: High

ID: 50924

File Name: suse_11_kernel-100920.nasl

Version: 1.18

Type: local

Agent: unix

Published: 12/2/2010

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:kernel-xen-devel, p-cpe:/a:novell:suse_linux:11:kernel-vmi, p-cpe:/a:novell:suse_linux:11:kernel-syms, p-cpe:/a:novell:suse_linux:11:kernel-default-extra, p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-xen-extra, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-default, p-cpe:/a:novell:suse_linux:11:kernel-source, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-pae, p-cpe:/a:novell:suse_linux:11:kernel-pae-base, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:11:kernel-xen, p-cpe:/a:novell:suse_linux:11:iscsitarget-kmp-default, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-pae, p-cpe:/a:novell:suse_linux:11:kernel-trace, p-cpe:/a:novell:suse_linux:11:kernel-vmi-base, p-cpe:/a:novell:suse_linux:11:kernel-pae, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default, p-cpe:/a:novell:suse_linux:11:kernel-pae-devel, p-cpe:/a:novell:suse_linux:11:kernel-default-man, p-cpe:/a:novell:suse_linux:11:kernel-trace-devel, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-xen, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-vmi, p-cpe:/a:novell:suse_linux:11:kernel-default-devel, p-cpe:/a:novell:suse_linux:11:kernel-desktop-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen-base, p-cpe:/a:novell:suse_linux:11:kernel-trace-base, p-cpe:/a:novell:suse_linux:11:oracleasm-kmp-default, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen, p-cpe:/a:novell:suse_linux:11:kernel-pae-extra, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-pae, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/20/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-2955, CVE-2010-2959, CVE-2010-3081, CVE-2010-3084, CVE-2010-3301