Language:
https://bugzilla.novell.com/show_bug.cgi?id=651219
https://bugzilla.novell.com/show_bug.cgi?id=653260
https://bugzilla.novell.com/show_bug.cgi?id=668872
https://bugzilla.novell.com/show_bug.cgi?id=671479
https://bugzilla.novell.com/show_bug.cgi?id=688996
https://bugzilla.novell.com/show_bug.cgi?id=694945
https://bugzilla.novell.com/show_bug.cgi?id=697920
https://bugzilla.novell.com/show_bug.cgi?id=703156
https://bugzilla.novell.com/show_bug.cgi?id=706973
https://bugzilla.novell.com/show_bug.cgi?id=725709
https://bugzilla.novell.com/show_bug.cgi?id=726600
https://bugzilla.novell.com/show_bug.cgi?id=726788
https://bugzilla.novell.com/show_bug.cgi?id=728339
https://bugzilla.novell.com/show_bug.cgi?id=728626
https://bugzilla.novell.com/show_bug.cgi?id=729854
https://bugzilla.novell.com/show_bug.cgi?id=730118
https://bugzilla.novell.com/show_bug.cgi?id=731004
https://bugzilla.novell.com/show_bug.cgi?id=731770
https://bugzilla.novell.com/show_bug.cgi?id=732296
https://bugzilla.novell.com/show_bug.cgi?id=732677
https://bugzilla.novell.com/show_bug.cgi?id=733146
https://bugzilla.novell.com/show_bug.cgi?id=733863
https://bugzilla.novell.com/show_bug.cgi?id=734056
https://bugzilla.novell.com/show_bug.cgi?id=735216
https://bugzilla.novell.com/show_bug.cgi?id=735446
https://bugzilla.novell.com/show_bug.cgi?id=735453
https://bugzilla.novell.com/show_bug.cgi?id=735635
https://bugzilla.novell.com/show_bug.cgi?id=736018
https://bugzilla.novell.com/show_bug.cgi?id=738400
https://bugzilla.novell.com/show_bug.cgi?id=740535
https://bugzilla.novell.com/show_bug.cgi?id=740703
https://bugzilla.novell.com/show_bug.cgi?id=740867
https://bugzilla.novell.com/show_bug.cgi?id=742270
http://support.novell.com/security/cve/CVE-2010-3873.html
http://support.novell.com/security/cve/CVE-2010-4164.html
http://support.novell.com/security/cve/CVE-2011-2494.html
http://support.novell.com/security/cve/CVE-2011-2699.html
http://support.novell.com/security/cve/CVE-2011-4077.html
http://support.novell.com/security/cve/CVE-2011-4081.html
http://support.novell.com/security/cve/CVE-2011-4110.html
http://support.novell.com/security/cve/CVE-2011-4127.html
http://support.novell.com/security/cve/CVE-2011-4132.html
http://support.novell.com/security/cve/CVE-2012-0038.html
https://bugzilla.novell.com/show_bug.cgi?id=707288
https://bugzilla.novell.com/show_bug.cgi?id=708625
https://bugzilla.novell.com/show_bug.cgi?id=711378
https://bugzilla.novell.com/show_bug.cgi?id=716023
Severity: High
ID: 57854
File Name: suse_11_kernel-120130.nasl
Version: 1.7
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 2/7/2012
Updated: 1/19/2021
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C
CPE: p-cpe:/a:novell:suse_linux:11:kernel-trace, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-trace, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-trace, p-cpe:/a:novell:suse_linux:11:kernel-xen-devel, p-cpe:/a:novell:suse_linux:11:kernel-syms, p-cpe:/a:novell:suse_linux:11:kernel-default-extra, p-cpe:/a:novell:suse_linux:11:kernel-default, p-cpe:/a:novell:suse_linux:11:kernel-xen-extra, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-default, p-cpe:/a:novell:suse_linux:11:kernel-source, cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:11:kernel-xen, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-default, p-cpe:/a:novell:suse_linux:11:kernel-ec2, p-cpe:/a:novell:suse_linux:11:kernel-default-base, p-cpe:/a:novell:suse_linux:11:kernel-ec2-base, p-cpe:/a:novell:suse_linux:11:kernel-trace-devel, p-cpe:/a:novell:suse_linux:11:btrfs-kmp-xen, p-cpe:/a:novell:suse_linux:11:kernel-default-devel, p-cpe:/a:novell:suse_linux:11:kernel-desktop-devel, p-cpe:/a:novell:suse_linux:11:kernel-xen-base, p-cpe:/a:novell:suse_linux:11:kernel-trace-base, p-cpe:/a:novell:suse_linux:11:ext4dev-kmp-xen, p-cpe:/a:novell:suse_linux:11:hyper-v-kmp-default
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Patch Publication Date: 1/30/2012
CVE: CVE-2010-3873, CVE-2010-4164, CVE-2011-2494, CVE-2011-2699, CVE-2011-4077, CVE-2011-4081, CVE-2011-4110, CVE-2011-4127, CVE-2011-4132, CVE-2012-0038