SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 3276 / 3280 / 3284)

high Nessus Plugin ID 51612

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

This SUSE Linux Enterprise 11 Service Pack 1 kernel contains various security fixes and lots of other bugfixes.

The following security issues were fixed :

- local users could crash the system by causing a NULL deref in the keyctl_session_to_parent() function.
(CVE-2010-2960)

- local users could crash the system by causing a NULL deref via IRDA sockets. (CVE-2010-2954)

- local users could crash the system by causing a NULL deref in ftrace. (CVE-2010-3079)

- several kernel functions could leak kernel stack memory contents. (CVE-2010-3078 / CVE-2010-3297 / CVE-2010-3298 / CVE-2010-3081 / CVE-2010-3296)

- local users could cause dereference of an uninitialized pointer via /dev/sequencer. (CVE-2010-3080)

- local users could corrupt kernel heap memory via ROSE sockets. (CVE-2010-3310)

- local users could write to any kernel memory location via the i915 GEM ioctl interface Additionally this update restores the compat_alloc_userspace() inline function. (CVE-2010-2962)

Solution

Apply SAT patch number 3276 / 3280 / 3284 as appropriate.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=582730

https://bugzilla.novell.com/show_bug.cgi?id=596646

https://bugzilla.novell.com/show_bug.cgi?id=600043

https://bugzilla.novell.com/show_bug.cgi?id=601520

https://bugzilla.novell.com/show_bug.cgi?id=613330

https://bugzilla.novell.com/show_bug.cgi?id=614226

https://bugzilla.novell.com/show_bug.cgi?id=616080

https://bugzilla.novell.com/show_bug.cgi?id=618059

https://bugzilla.novell.com/show_bug.cgi?id=618072

https://bugzilla.novell.com/show_bug.cgi?id=618379

https://bugzilla.novell.com/show_bug.cgi?id=620443

https://bugzilla.novell.com/show_bug.cgi?id=620654

https://bugzilla.novell.com/show_bug.cgi?id=624020

https://bugzilla.novell.com/show_bug.cgi?id=624814

https://bugzilla.novell.com/show_bug.cgi?id=625674

https://bugzilla.novell.com/show_bug.cgi?id=626880

https://bugzilla.novell.com/show_bug.cgi?id=629170

https://bugzilla.novell.com/show_bug.cgi?id=632568

https://bugzilla.novell.com/show_bug.cgi?id=633268

https://bugzilla.novell.com/show_bug.cgi?id=633543

https://bugzilla.novell.com/show_bug.cgi?id=633593

https://bugzilla.novell.com/show_bug.cgi?id=633733

https://bugzilla.novell.com/show_bug.cgi?id=634637

https://bugzilla.novell.com/show_bug.cgi?id=635425

https://bugzilla.novell.com/show_bug.cgi?id=636112

https://bugzilla.novell.com/show_bug.cgi?id=636461

https://bugzilla.novell.com/show_bug.cgi?id=636561

https://bugzilla.novell.com/show_bug.cgi?id=636850

https://bugzilla.novell.com/show_bug.cgi?id=637436

https://bugzilla.novell.com/show_bug.cgi?id=637502

https://bugzilla.novell.com/show_bug.cgi?id=637639

https://bugzilla.novell.com/show_bug.cgi?id=637944

https://bugzilla.novell.com/show_bug.cgi?id=638277

https://bugzilla.novell.com/show_bug.cgi?id=638400

https://bugzilla.novell.com/show_bug.cgi?id=638613

https://bugzilla.novell.com/show_bug.cgi?id=638618

https://bugzilla.novell.com/show_bug.cgi?id=638807

https://bugzilla.novell.com/show_bug.cgi?id=638860

https://bugzilla.novell.com/show_bug.cgi?id=639161

https://bugzilla.novell.com/show_bug.cgi?id=639197

https://bugzilla.novell.com/show_bug.cgi?id=639481

https://bugzilla.novell.com/show_bug.cgi?id=639482

https://bugzilla.novell.com/show_bug.cgi?id=639483

https://bugzilla.novell.com/show_bug.cgi?id=639709

https://bugzilla.novell.com/show_bug.cgi?id=639728

https://bugzilla.novell.com/show_bug.cgi?id=639944

https://bugzilla.novell.com/show_bug.cgi?id=640276

https://bugzilla.novell.com/show_bug.cgi?id=640721

https://bugzilla.novell.com/show_bug.cgi?id=641247

https://bugzilla.novell.com/show_bug.cgi?id=642009

https://bugzilla.novell.com/show_bug.cgi?id=642449

https://bugzilla.novell.com/show_bug.cgi?id=643909

https://bugzilla.novell.com/show_bug.cgi?id=643914

https://bugzilla.novell.com/show_bug.cgi?id=643922

http://support.novell.com/security/cve/CVE-2010-2954.html

http://support.novell.com/security/cve/CVE-2010-2960.html

http://support.novell.com/security/cve/CVE-2010-2962.html

http://support.novell.com/security/cve/CVE-2010-3078.html

http://support.novell.com/security/cve/CVE-2010-3079.html

http://support.novell.com/security/cve/CVE-2010-3080.html

http://support.novell.com/security/cve/CVE-2010-3081.html

http://support.novell.com/security/cve/CVE-2010-3296.html

http://support.novell.com/security/cve/CVE-2010-3297.html

http://support.novell.com/security/cve/CVE-2010-3298.html

http://support.novell.com/security/cve/CVE-2010-3310.html

Plugin Details

Severity: High

ID: 51612

File Name: suse_11_kernel-101007.nasl

Version: 1.16

Type: local

Agent: unix

Published: 1/21/2011

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:kernel-xen-devel, p-cpe:/a:novell:suse_linux:11:kernel-syms, p-cpe:/a:novell:suse_linux:11:kernel-default-extra, p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-xen-extra, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-default, p-cpe:/a:novell:suse_linux:11:kernel-source, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-pae, p-cpe:/a:novell:suse_linux:11:kernel-pae-base, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:11:kernel-xen, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-pae, p-cpe:/a:novell:suse_linux:11:kernel-trace, p-cpe:/a:novell:suse_linux:11:kernel-pae, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default, p-cpe:/a:novell:suse_linux:11:kernel-pae-devel, p-cpe:/a:novell:suse_linux:11:kernel-default-man, p-cpe:/a:novell:suse_linux:11:kernel-trace-devel, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-xen, p-cpe:/a:novell:suse_linux:11:kernel-default-devel, p-cpe:/a:novell:suse_linux:11:kernel-desktop-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen-base, p-cpe:/a:novell:suse_linux:11:kernel-trace-base, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen, p-cpe:/a:novell:suse_linux:11:kernel-pae-extra, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-pae, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/7/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-2954, CVE-2010-2960, CVE-2010-2962, CVE-2010-3078, CVE-2010-3079, CVE-2010-3080, CVE-2010-3081, CVE-2010-3296, CVE-2010-3297, CVE-2010-3298, CVE-2010-3310